Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2021-34675 | An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers | 
|---|---|
| https://projectblack.io/blog/zendto-nday-vulnerabilities/ | 
                     | 
            
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Mon, 07 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Sat, 05 Apr 2025 05:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics | 
        
        cvssV3_1
         
  | 
Sat, 05 Apr 2025 05:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request. | |
| References | 
         | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-07T16:22:26.249Z
Reserved: 2025-04-05T00:00:00.000Z
Link: CVE-2021-47667
Updated: 2025-04-07T16:22:16.500Z
Status : Awaiting Analysis
Published: 2025-04-05T05:15:43.223
Modified: 2025-04-07T17:15:32.873
Link: CVE-2021-47667
No data.
                        OpenCVE Enrichment
                    Updated: 2025-07-12T22:01:02Z
 EUVD