OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-4886-d3b14-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-4886-d3b14-1.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-4886-d3b14-1.html - Third Party Advisory |
Information
Published : 2021-07-07 14:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32530
Mitre link : CVE-2021-32530
CVE.ORG link : CVE-2021-32530
JSON object : View
Products Affected
qsan
- xevo
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')