CVE-2021-41290
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
30/09/2021
Last modified:
21/10/2022
Description
ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



