.. / CVE-2021-21805

Exploit for Advantech R-SeeNet 2.4.12 - OS Command Injection (CVE-2021-21805)

Description:

Advantech R-SeeNet 2.4.12 is susceptible to remote OS command execution via the ping.php script functionality. An attacker, via a specially crafted HTTP request, can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

Nuclei Template

View the template here CVE-2021-21805.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-21805.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21805
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1274
https://nvd.nist.gov/vuln/detail/CVE-2021-21805
https://github.com/ARPSyndicate/kenzer-templates