The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-19379 | The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. |
Fixes
Solution
Please refer to QSANS's recommended measures
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T21:57:43.704Z
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32533

No data.

Status : Modified
Published: 2021-07-07T14:15:11.963
Modified: 2024-11-21T06:07:12.967
Link: CVE-2021-32533

No data.

No data.