Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-14434 Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T21:26:10.675Z

Reserved: 2021-02-25T00:00:00

Link: CVE-2021-27692

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-16T00:15:12.067

Modified: 2024-11-21T05:58:26.020

Link: CVE-2021-27692

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.