Description
QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
No analysis available yet.
Remediation
Vendor Solution
QSAN SANOS v2.1.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19380 | QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-17T01:35:39.320Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32534
No data.
Status : Modified
Published: 2021-07-07T14:15:12.030
Modified: 2024-11-21T06:07:13.080
Link: CVE-2021-32534
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD