CVE-2021-45401

A Command injection vulnerability exists in Tenda AC10U AC1200 Smart Dual-band Wireless Router AC10U V1.0 Firmware V15.03.06.49_multi via the setUsbUnload functionality. The vulnerability is caused because the client controlled "deviceName" value is passed directly to the "doSystemCmd" function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:32

Type Values Removed Values Added
References () https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf - Exploit, Third Party Advisory () https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf - Exploit, Third Party Advisory

Information

Published : 2022-02-18 18:15

Updated : 2024-11-21 06:32


NVD link : CVE-2021-45401

Mitre link : CVE-2021-45401

CVE.ORG link : CVE-2021-45401


JSON object : View

Products Affected

tendacn

  • ac10u_firmware
  • ac10u
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')