China Mobile An Lianbao WF-1 v1.0.1 router web interface through /api/ZRMacClone/mac_addr_clone receives parameters by POST request, and the parameter macType has a command injection vulnerability. An attacker can use the vulnerability to execute remote commands.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://iot.10086.cn/?l=en-us - Product | |
References | () https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/China%20Mobile%20An%20Lianbao%20WF-1%20router%20Command%20Injection9.md - Broken Link, Third Party Advisory | |
References | () https://www.cnvd.org.cn/flaw/show/CNVD-2021-03520 - Third Party Advisory | |
References | () https://www.ebuy7.com/item/china-mobile-wireless-router-qualcomm-qiki-wifi6-routing-mesh-network-home-5g-dual-frequency-double-gigabit-port-wall-wall-high-speed-%E2%80%8B%E2%80%8Bhigh-power-enhanced-dormitory-students-an-lianbao-wf-1-628692180620 - Broken Link, Third Party Advisory |
Information
Published : 2022-01-15 10:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33963
Mitre link : CVE-2021-33963
CVE.ORG link : CVE-2021-33963
JSON object : View
Products Affected
chinamobile
- an_lianbao_wf-1_firmware
- an_lianbao_wf-1
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')