Description
OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.
Published: 2021-07-07
Score: 9.8 Critical
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

QSAN XEVO v2.1.0

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-19376 OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-09-16T22:02:09.065Z

Reserved: 2021-05-10T00:00:00.000Z

Link: CVE-2021-32530

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-07T14:15:11.753

Modified: 2024-11-21T06:07:12.623

Link: CVE-2021-32530

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses