Files
CVEs-PoC/2021/CVE-2021-27692.md
2025-09-29 21:09:30 +02:00

19 lines
890 B
Markdown

### [CVE-2021-27692](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27692)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
### POC
#### Reference
- https://hackmd.io/%40aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu
- https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu
#### Github
- https://github.com/ARPSyndicate/cve-scores