CVE-2021-21805
CRITICAL EXPLOITED NUCLEIAdvantech R-seenet - OS Command Injection
Title source: ruleDescription
An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to trigger this vulnerability.
Nuclei Templates (1)
Advantech R-SeeNet 2.4.12 - OS Command Injection
CRITICALVERIFIEDby arafatansari
Shodan:
http.html:"R-SeeNet" || http.html:"r-seenet"
FOFA:
body="r-seenet"
Scores
CVSS v3
9.8
EPSS
0.9287
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-12-24
CWE
CWE-78
Status
published
Products (1)
advantech/r-seenet
2.4.12
Published
Aug 05, 2021
Tracked Since
Feb 18, 2026