### [CVE-2021-22648](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22648) ![](https://img.shields.io/static/v1?label=Product&message=TBox&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=LT2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=MS-CPU32%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=MS-CPU32-S2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=RM2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=TG2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CVE-732&color=brightgreen) ### Description Ovarro TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon