CVE-2021-20138

HIGH

Gryphonconnect Gryphon Tower Firmware - OS Command Injection

Title source: rule
STIX 2.1

Description

An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface.

Exploits (1)

nomisec WRITEUP
by ShaikUsaf · poc
https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138

References (1)

Core 1
Core References
Exploit, Vendor Advisory x_refsource_misc
https://www.tenable.com/security/research/tra-2021-51

Scores

CVSS v3 8.8
EPSS 0.0818
EPSS Percentile 92.2%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
gryphonconnect/gryphon_tower_firmware < 04.0004.12
Published Dec 09, 2021
Tracked Since Feb 18, 2026