CVE-2021-21805

CRITICAL EXPLOITED NUCLEI

Advantech R-seenet - OS Command Injection

Title source: rule

Description

An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to trigger this vulnerability.

Nuclei Templates (1)

Advantech R-SeeNet 2.4.12 - OS Command Injection
CRITICALVERIFIEDby arafatansari
Shodan: http.html:"R-SeeNet" || http.html:"r-seenet"
FOFA: body="r-seenet"

Scores

CVSS v3 9.8
EPSS 0.9287
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-12-24
CWE
CWE-78
Status published
Products (1)
advantech/r-seenet 2.4.12
Published Aug 05, 2021
Tracked Since Feb 18, 2026