Description
Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by unauthenticated command injection. The url parameter of the function module downloadAndUpdate is vulnerable to an command Injection. Unfiltered user input is used to generate code which then gets executed when downloading new firmware.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-32592 | Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by unauthenticated command injection. The url parameter of the function module downloadAndUpdate is vulnerable to an command Injection. Unfiltered user input is used to generate code which then gets executed when downloading new firmware. |
References
| Link | Providers |
|---|---|
| https://github.com/delikely/advisory/tree/main/GARO |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:54:31.089Z
Reserved: 2021-12-27T00:00:00.000Z
Link: CVE-2021-45876
No data.
Status : Modified
Published: 2022-03-21T11:15:10.620
Modified: 2024-11-21T06:33:10.977
Link: CVE-2021-45876
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD