QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html |
History
No history.
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2021-07-07T14:12:23.901676Z
Updated: 2024-09-17T01:35:39.320Z
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32534
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-07-07T14:15:12.030
Modified: 2024-11-21T06:07:13.080
Link: CVE-2021-32534
Redhat
No data.