CVE-2021-27692

Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:tendacn:g1_firmware:15.11.0.16\(9024\)_cn:*:*:*:*:*:*:*
cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\(9502\)_cn:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:tendacn:g3_firmware:15.11.0.16\(9024\)_cn:*:*:*:*:*:*:*
cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\(9502\)_cn:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:58

Type Values Removed Values Added
References () https://hackmd.io/%40aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu - () https://hackmd.io/%40aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu -

07 Nov 2023, 03:32

Type Values Removed Values Added
References
  • {'url': 'https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu', 'name': 'https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://hackmd.io/%40aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu -

Information

Published : 2021-04-16 00:15

Updated : 2024-11-21 05:58


NVD link : CVE-2021-27692

Mitre link : CVE-2021-27692

CVE.ORG link : CVE-2021-27692


JSON object : View

Products Affected

tendacn

  • g1
  • g3
  • g3_firmware
  • g1_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer