First published: Thu Apr 15 2021(Updated: )
Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn G1 Firmware | =15.11.0.16\(9024\)_cn | |
Tendacn G1 Firmware | =15.11.0.17\(9502\)_cn | |
Tendacn G1 | ||
Tendacn G3 Firmware | =15.11.0.16\(9024\)_cn | |
Tendacn G3 Firmware | =15.11.0.17\(9502\)_cn | |
Tendacn G3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27692 is classified as a critical vulnerability due to its potential for remote command execution.
To fix CVE-2021-27692, update the firmware of Tenda G1 or G3 routers to the latest version provided by the vendor.
CVE-2021-27692 affects Tenda G1 and G3 routers running firmware versions v15.11.0.16(9024)_CN and v15.11.0.17(9502)_CN.
CVE-2021-27692 is a command injection vulnerability allowing remote attackers to execute arbitrary OS commands.
Yes, CVE-2021-27692 can be exploited remotely through a crafted action request.