CVE-2020-21999
Summary
| CVE | CVE-2020-21999 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-04 16:15:00 UTC |
| Updated | 2021-05-11 19:22:00 UTC |
| Description | iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Iwt | Facesentry Access Control System | - | All | All | All |
| Operating System | Iwt | Facesentry Access Control System Firmware | 5.7.0 | All | All | All |
| Operating System | Iwt | Facesentry Access Control System Firmware | 5.7.2 | All | All | All |
| Operating System | Iwt | Facesentry Access Control System Firmware | 6.4.8 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| FaceSentry Access Control System 6.4.8 - Remote Root Exploit - Hardware webapps Exploit | EXPLOIT-DB | www.exploit-db.com | |
| Zero Science Lab » FaceSentry Access Control System 6.4.8 Remote Root Exploit | MISC | www.zeroscience.mk | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.