Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An authenticated user can decrypt firmware and can read sensitive information, such as a password or decryption key.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/161560/Yeastar-TG400-GSM-Gateway-91.3.0.3-Path-Traversal.html | Exploit Third Party Advisory VDB Entry |
http://yeastar.com | Vendor Advisory |
https://github.com/SQSamir/CVE-2021-27328 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/161560/Yeastar-TG400-GSM-Gateway-91.3.0.3-Path-Traversal.html | Exploit Third Party Advisory VDB Entry |
http://yeastar.com | Vendor Advisory |
https://github.com/SQSamir/CVE-2021-27328 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/161560/Yeastar-TG400-GSM-Gateway-91.3.0.3-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://yeastar.com - Vendor Advisory | |
References | () https://github.com/SQSamir/CVE-2021-27328 - Exploit, Third Party Advisory |
Information
Published : 2021-02-19 19:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27328
Mitre link : CVE-2021-27328
CVE.ORG link : CVE-2021-27328
JSON object : View
Products Affected
yeastar
- neogate_tg400_firmware
- neogate_tg400
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')