CVE-2021-25899
HIGH EXPLOITED NUCLEIVoid Aurall Rec Monitor - SQL Injection
Title source: ruleDescription
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
Nuclei Templates (1)
Void Aural Rec Monitor 9.0.0.1 - SQL Injection
HIGHby edoardottt
Shodan:
html:"AURALL" || http.html:"aurall"
FOFA:
body="aurall"
Scores
CVSS v3
7.5
EPSS
0.7300
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2024-01-22
CWE
CWE-89
Status
published
Products (1)
void/aurall_rec_monitor
9.0.0.1
Published
Apr 23, 2021
Tracked Since
Feb 18, 2026