Exploit
CVE-2021-3297

Improper Authentication (CWE-287)

Published: Jan 26, 2021 / Updated: 46mo ago

010
CVSS 7.8EPSS 18.89%High
CVE info copied to clipboard

On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2021-3297. See article

Jan 26, 2021 at 9:04 AM / twitter.com
EPSS

EPSS Score was set to: 18.89% (Percentile: 95.6%)

Sep 17, 2023 at 3:14 AM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 26, 2024 at 11:39 AM
Static CVE Timeline Graph

Affected Systems

Zyxel/nbg2105_firmware
+null more

Exploits

https://github.com/nieldk/vulnerabilities/blob/main/zyxel%20nbg2105/Admin%20bypass
+null more

Patches

www.zyxel.com
+null more

Links to Mitre Att&cks

T1548: Abuse Elevation Control Mechanism
+null more

Attack Patterns

CAPEC-114: Authentication Abuse
+null more

References

Laravel rce poc
The CVE-2021-42321 is a high-severity remote code execution issue that occurs due Sep 07, 2021 · A researcher published the PoC exploit code for a Ghostscript zero-day vulnerability that could allow completely compromise a server. Huntress is actively uncovering the effects of this We have observed that a proof-of-concept (PoC) exploit related to a remote code execution vulnerability, affecting Windows Print Spooler, has been published online for a short period of time.

News

CPAI-2021-2211
The post CPAI-2021-2211 appeared first on Check Point Software .
Auto Generated cves.json [Wed Mar 22 11:30:52 UTC 2023] :robot:
For complete details refer to the referenced GHSL-2021-023.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"cves/2021/CVE-2021-32819.yaml"} {"ID":"CVE-2021-32820","Info":{"Name":"Express-handlebars - Local File Inclusion","Severity":"high","Description":"Express-handlebars is susceptible to local file inclusion because it mixes pure template data with engine configuration options through the Express render API. An attacker with a role as low as author can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations.\n","Classification":{"CVSSScore":"8.8"}},"file_path":"cves/2022/CVE-2022-3768.yaml"} {"ID":"CVE-2022-3800","Info":{"Name":"IBAX go-ibax - SQL Injection","Severity":"high","Description":"A vulnerability, which was classified as critical, has been found in IBAX go-ibax.
Auto Generated Templates Checksum [Wed Mar 22 03:42:43 UTC 2023] :robot:
Auto Generated Templates Checksum [Wed Mar 22 03:42:43 UTC 2023] :robot:
SexyBeast233/SecBooks
安全类各家文库大乱斗 SecBooks 各大文库公众号文章收集,部分文库使用gitbook部署;部分公众号使用杂散文章为主。 使用插件 "hide-element", "back-to-top-button", "-lunr", "-search", "search-pro", "splitter" #目录自动生成插件(book sm) npm install -g gitbook-summary SecBooks目录 【POC合集】pochouse Apache Solr [Solr Velocity 注入远程命令执行漏洞 (CVE-2019-17558)](【POC合集】pochouse/Apache-Solr/Solr Velocity 注入远程命令执行漏洞 (CVE-2019-17558)/README.md) Drupal [SA CORE 2019 003 RCE CVE 2019 6340](【POC合集】pochouse/Drupal/SA-CORE-2019-003 RCE (CVE-2019-6340)/README.md) Joomla [Joomla 3.7.0 SQL注入(CVE-2017-8917)](【POC合集】pochouse/Joomla/Joomla 3.7.0 SQL注入(CVE-2017-8917)/README.md) Spring Weblogic 【公众号文章】bugs [(0day)Apache Solr 任意文件读取漏洞](【公众号文章】bugs/(0day)Apache Solr 任意文件读取漏洞.md) [(CNVD-2021-14544)海康威视 流媒体管理服务器任意文件读取 - 通用弱口令](【公众号文章】bugs/(CNVD-2021-14544)海康威视 流媒体管理服务器任意文件读取 - 通用弱口令.md) [(CNVD-2021-17369)锐捷无线 smartweb 管理系统管理员密码泄露](【公众号文章】bugs/(CNVD-2021-17369)锐捷无线 smartweb 管理系统管理员密码泄露.md) [(CVE-2020-25078)D-Link DCS 系列监控 账号密码信息泄露漏洞](【公众号文章】bugs/(CVE-2020-25078)D-Link DCS 系列监控 账号密码信息泄露漏洞.md) [(CVE-2020-7961)Liferay Portal RCE 反序列化命令执行漏洞](【公众号文章】bugs/(CVE-2020-7961)Liferay Portal RCE 反序列化命令执行漏洞.md) [(CVE-2021-30461)VoIPmonitor 远程命令执行](【公众号文章】bugs/(CVE-2021-30461)VoIPmonitor 远程命令执行.md) [(CVE-2021-3297)Zyxel NBG2105 身份验证绕过](【公众号文章】bugs/(CVE-2021-3297)Zyxel NBG2105 身份验证绕过.md) [(补充) 通达 OA v11-8 存储型 XSS 与 命令执行](【公众号文章】bugs/(补充) 通达 OA v11-8 存储型 XSS 与 命令执行.md) [[代码审计] doccms SQL 注入漏洞分析](【公众号文章】bugs/[代码审计] doccms SQL 注入漏洞分析.md) [[系统安全] 七. 逆向分析之 PE 病毒原理、C++ 文件加解密及 OllyDbg 逆向](【公众号文章】bugs/[系统安全] 七. 逆向分析之 PE 病毒原理、C++ 文件加解密及 OllyDbg 逆向.md) [[系统安全] 九. Windows 漏洞利用之 MS08-067 远程代码执行漏洞复现及深度提权](【公众号文章】bugs/[系统安全] 九. Windows 漏洞利用之 MS08-067 远程代码执行漏洞复现及深度提权.md) [[系统安全] 二. 如何学好逆向分析及吕布传游戏逆向案例](【公众号文章】bugs/[系统安全] 二. 如何学好逆向分析及吕布传游戏逆向案例.md) [[系统安全] 二十三- 逆向分析之 OllyDbg 动态调试复习及 TraceMe 案例分析](【公众号文章】bugs/[系统安全] 二十三- 逆向分析之 OllyDbg 动态调试复习及 TraceMe 案例分析.md) [[系统安全] 二十四.逆向分析之OD调试INT3断点、反调试、硬件断点与内存断点](【公众号文章】bugs/[系统安全] 二十四.逆向分析之OD调试INT3断点、反调试、硬件断点与内存断点.md) [[系统安全] 五.OllyDbg和Cheat Engine工具逆向分析植物大战僵尸游戏](【公众号文章】bugs/[系统安全] 五.OllyDbg和Cheat Engine工具逆向分析植物大战僵尸游戏.md) [[系统安全] 八. Windows 漏洞利用之 CVE-2019-0708 复现及蓝屏攻击](【公众号文章】bugs/[系统安全] 八. Windows 漏洞利用之 CVE-2019-0708 复现及蓝屏攻击.md) [[系统安全] 六. 逆向分析之条件语句和循环语句源码还原及流程控制](【公众号文章】bugs/[系统安全] 六.
Laravel rce poc
The CVE-2021-42321 is a high-severity remote code execution issue that occurs due Sep 07, 2021 · A researcher published the PoC exploit code for a Ghostscript zero-day vulnerability that could allow completely compromise a server. Huntress is actively uncovering the effects of this We have observed that a proof-of-concept (PoC) exploit related to a remote code execution vulnerability, affecting Windows Print Spooler, has been published online for a short period of time.
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI