CVE-2021-31251

An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:bf-430:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:chiyu-tech:bf-431_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:bf-431:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:chiyu-tech:bf-450m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:bf-450m:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:chiyu-tech:semac_s2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:semac_s2:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:chiyu-tech:semac_d1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:semac_d1:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:chiyu-tech:semac_d2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:semac_d2:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:chiyu-tech:semac_d4_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:semac_d4:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:chiyu-tech:semac_s3v3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:semac_s3v3:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:chiyu-tech:semac_d2_n300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:semac_d2_n300:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:chiyu-tech:semac_s1_osdp_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chiyu-tech:semac_s1_osdp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:05

Type Values Removed Values Added
References () https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31251 - Exploit, Third Party Advisory () https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31251 - Exploit, Third Party Advisory
References () https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks/#.YLqK1KhKguU - Exploit, Third Party Advisory () https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks/#.YLqK1KhKguU - Exploit, Third Party Advisory
References () https://www.chiyu-tech.com/msg/message-Firmware-update-87.html - Vendor Advisory () https://www.chiyu-tech.com/msg/message-Firmware-update-87.html - Vendor Advisory

Information

Published : 2021-06-04 21:15

Updated : 2024-11-21 06:05


NVD link : CVE-2021-31251

Mitre link : CVE-2021-31251

CVE.ORG link : CVE-2021-31251


JSON object : View

Products Affected

chiyu-tech

  • semac_s2_firmware
  • bf-430_firmware
  • bf-450m_firmware
  • semac_d4_firmware
  • bf-431_firmware
  • semac_s1_osdp_firmware
  • semac_d2_n300
  • semac_s3v3
  • bf-431
  • semac_d1_firmware
  • semac_d4
  • semac_s3v3_firmware
  • semac_d1
  • semac_d2
  • semac_d2_firmware
  • semac_d2_n300_firmware
  • semac_s2
  • semac_s1_osdp
  • bf-450m
  • bf-430
CWE
CWE-287

Improper Authentication