{"api_version":"1","generated_at":"2026-04-23T07:57:21+00:00","cve":"CVE-2021-39474","urls":{"html":"https://cve.report/CVE-2021-39474","api":"https://cve.report/api/cve/CVE-2021-39474.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-39474","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-39474"},"summary":{"title":"CVE-2021-39474","description":"Vulnerability in the product Docsis 3.0 UBC1319BA00 Router supported affected version 1319010201r009. The vulnerability allows an attacker with privileges and network access through the ping.cmd component to execute commands on the device.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-11-10 12:15:00","updated_at":"2021-11-16 14:56:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://www.ubeeinteractive.com/?product=ubc1319","name":"https://www.ubeeinteractive.com/?product=ubc1319","refsource":"MISC","tags":[],"title":"UBC1319 – Ubee Interactive","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://saikotwolf.medium.com/f9ed24e14e51","name":"https://saikotwolf.medium.com/f9ed24e14e51","refsource":"MISC","tags":[],"title":"OS Command Injection on UBC1319 Router CPE | by Gabriel Romero | Medium","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-39474","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-39474","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"39474","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ubeeinteractive","cpe5":"ubc1319","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"39474","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ubeeinteractive","cpe5":"ubc1319_firmware","cpe6":"1319010201r009","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-39474","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Vulnerability in the product Docsis 3.0 UBC1319BA00 Router supported affected version 1319010201r009. The vulnerability allows an attacker with privileges and network access through the ping.cmd component to execute commands on the device."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://saikotwolf.medium.com/f9ed24e14e51","refsource":"MISC","name":"https://saikotwolf.medium.com/f9ed24e14e51"},{"url":"https://www.ubeeinteractive.com/?product=ubc1319","refsource":"MISC","name":"https://www.ubeeinteractive.com/?product=ubc1319"}]}},"nvd":{"publishedDate":"2021-11-10 12:15:00","lastModifiedDate":"2021-11-16 14:56:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ubeeinteractive:ubc1319_firmware:1319010201r009:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:ubeeinteractive:ubc1319:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"39474","Ordinal":"215178","Title":"CVE-2021-39474","CVE":"CVE-2021-39474","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"39474","Ordinal":"1","NoteData":"Vulnerability in the product Docsis 3.0 UBC1319BA00 Router supported affected version 1319010201r009. The vulnerability allows an attacker with privileges and network access through the ping.cmd component to execute commands on the device.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"39474","Ordinal":"2","NoteData":"2021-11-10","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"39474","Ordinal":"3","NoteData":"2021-11-10","Type":"Other","Title":"Modified"}]}}}