CVE-2021-33831

MEDIUM

Th-wildau Covid-19 Contact Tracing < 2021-09-01 - Resource Allocation Without Limits

Title source: rule
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2021-33831. PoCs published by lanmarc77.

AI-analyzed exploit summary The repository contains a functional Perl script that automates the creation of fake users and check-ins in a COVID-19 contact tracing application, exploiting the lack of CAPTCHA or rate-limiting protections. The exploit demonstrates a denial-of-service (DoS) attack by flooding the system with fake user registrations and check-ins.

Description

api/account/register in the TH Wildau COVID-19 Contact Tracing application through 2021-09-01 has Incorrect Access Control. An attacker can interfere with tracing of infection chains by creating 500 random users within 2500 seconds.

Exploits (1)

nomisec WORKING POC
by lanmarc77 · poc
https://github.com/lanmarc77/CVE-2021-33831

The repository contains a functional Perl script that automates the creation of fake users and check-ins in a COVID-19 contact tracing application, exploiting the lack of CAPTCHA or rate-limiting protections. The exploit demonstrates a denial-of-service (DoS) attack by flooding the system with fake user registrations and check-ins.

Classification
Working Poc 100%
Attack Type
Dos
Complexity
Moderate
Reliability
Reliable
Target: iCampus Corona contact tracing application (Laravel backend)
No auth needed
Prerequisites: Network access to the target application · Ability to send HTTP requests to the registration and check-in endpoints
devstral-2 · analyzed Feb 18, 2026 Full analysis →

References (2)

Core 2
Core References
Third Party Advisory x_refsource_misc
https://github.com/lanmarc77/CVE-2021-33831

Scores

CVSS v3 6.5
EPSS 0.0803
EPSS Percentile 92.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-770
Status published
Products (1)
th-wildau/covid-19_contact_tracing < 2021-09-01
Published Sep 07, 2021
Tracked Since Feb 18, 2026