Lucene search

K
nvd[email protected]NVD:CVE-2021-33530
HistoryJun 25, 2021 - 7:15 p.m.

CVE-2021-33530

2021-06-2519:15:09
CWE-78
web.nvd.nist.gov
1

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

65.9%

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.

Affected configurations

NVD
Node
weidmuellerie-wl-bl-ap-cl-eu_firmwareRange1.16.18
AND
weidmuellerie-wl-bl-ap-cl-euMatch-
Node
weidmuellerie-wlt-bl-ap-cl-eu_firmwareRange1.16.18
AND
weidmuellerie-wlt-bl-ap-cl-euMatch-
Node
weidmuellerie-wl-bl-ap-cl-us_firmwareRange1.16.18
AND
weidmuellerie-wl-bl-ap-cl-usMatch-
Node
weidmuellerie-wlt-bl-ap-cl-us_firmwareRange1.16.18
AND
weidmuellerie-wlt-bl-ap-cl-usMatch-
Node
weidmuellerie-wl-vl-ap-br-cl-eu_firmwareRange1.16.18
AND
weidmuellerie-wl-vl-ap-br-cl-euMatch-
Node
weidmuellerie-wlt-vl-ap-br-cl-eu_firmwareRange1.16.18
AND
weidmuellerie-wlt-vl-ap-br-cl-euMatch-
Node
weidmuellerie-wl-vl-ap-br-cl-us_firmwareRange1.16.18
AND
weidmuellerie-wl-vl-ap-br-cl-usMatch-
Node
weidmuellerie-wlt-vl-ap-br-cl-us_firmwareRange1.16.18
AND
weidmuellerie-wlt-vl-ap-br-cl-usMatch-
Node
weidmuellerie-wl-bl-ap-cl-euMatch-
AND
weidmuellerie-wl-bl-ap-cl-eu_firmwareRange1.11.10
Node
weidmuellerie-wlt-bl-ap-cl-euMatch-
AND
weidmuellerie-wlt-bl-ap-cl-eu_firmwareRange1.11.10
Node
weidmuellerie-wl-bl-ap-cl-usMatch-
AND
weidmuellerie-wl-bl-ap-cl-us_firmwareRange1.11.10
Node
weidmuellerie-wlt-bl-ap-cl-usMatch-
AND
weidmuellerie-wlt-bl-ap-cl-us_firmwareRange1.11.10
Node
weidmuellerie-wl-vl-ap-br-cl-euMatch-
AND
weidmuellerie-wl-vl-ap-br-cl-eu_firmwareRange1.11.10
Node
weidmuellerie-wlt-vl-ap-br-cl-euMatch-
AND
weidmuellerie-wlt-vl-ap-br-cl-eu_firmwareRange1.11.10
Node
weidmuellerie-wl-vl-ap-br-cl-usMatch-
AND
weidmuellerie-wl-vl-ap-br-cl-us_firmwareRange1.11.10
Node
weidmuellerie-wlt-vl-ap-br-cl-usMatch-
AND
weidmuellerie-wlt-vl-ap-br-cl-us_firmwareRange1.11.10

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

65.9%

Related for NVD:CVE-2021-33530