Description
OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.
No analysis available yet.
Remediation
Vendor Solution
QSAN XEVO v2.1.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19376 | OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4886-d3b14-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T22:02:09.065Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32530
No data.
Status : Modified
Published: 2021-07-07T14:15:11.753
Modified: 2024-11-21T06:07:12.623
Link: CVE-2021-32530
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD