CVE-2021-41290

ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-09-30 11:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-41290

Mitre link : CVE-2021-41290

CVE.ORG link : CVE-2021-41290


JSON object : View

Products Affected

ecoa

  • riskterminator
  • ecs_router_controller-ecs_firmware
  • ecs_router_controller-ecs
  • riskbuster
  • riskbuster_firmware
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-434

Unrestricted Upload of File with Dangerous Type