CVE-2021-20138
HIGHGryphonconnect Gryphon Tower Firmware - OS Command Injection
Title source: ruleDescription
An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface.
Exploits (1)
nomisec
WRITEUP
by ShaikUsaf · poc
https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138
References (1)
Core 1
Core References
Exploit, Vendor Advisory x_refsource_misc
https://www.tenable.com/security/research/tra-2021-51
Scores
CVSS v3
8.8
EPSS
0.0818
EPSS Percentile
92.2%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
gryphonconnect/gryphon_tower_firmware
< 04.0004.12
Published
Dec 09, 2021
Tracked Since
Feb 18, 2026