Several high privileged APIs on the Vizio P65-F1 6.0.31.4-2 and E50x-E1 10.0.31.4-2 Smart TVs do not enforce access controls, allowing an unauthenticated threat actor to access privileged functionality, leading to OS command execution. The specific attack methodology is a file upload.
References
Link | Resource |
---|---|
https://www.l9group.com/advisories/vizio-tv-unauthenticated-remote-code-execution | Exploit Third Party Advisory |
https://www.vizio.com | Product |
https://www.l9group.com/advisories/vizio-tv-unauthenticated-remote-code-execution | Exploit Third Party Advisory |
https://www.vizio.com | Product |
Configurations
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.l9group.com/advisories/vizio-tv-unauthenticated-remote-code-execution - Exploit, Third Party Advisory | |
References | () https://www.vizio.com - Product |
Information
Published : 2021-08-26 12:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27944
Mitre link : CVE-2021-27944
CVE.ORG link : CVE-2021-27944
JSON object : View
Products Affected
vizio
- p65-f1_firmware
- e50x-e1_firmware
- e50x-e1
- p65-f1
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')