First published: Wed Dec 22 2021(Updated: )
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘mac_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech R-SeeNet | =2.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-21928.
The severity of CVE-2021-21928 is high.
This vulnerability occurs when a specially-crafted HTTP request is made, which can lead to SQL injection.
An attacker can exploit CVE-2021-21928 by making authenticated HTTP requests at the 'mac_filter' parameter or through cross-site request forgery.
It is recommended to apply the latest security patches or updates provided by the software vendor to fix the vulnerability.