6.5
CVSSv2

CVE-2021-26828

Published: 11/06/2021 Updated: 21/06/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

OpenPLC ScadaBR up to and including 0.9.1 on Linux and up to and including 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openplcproject scadabr

Vendor Advisories

Check Point Reference: CPAI-2021-2130 Date Published: 12 Mar 2024 Severity: High ...

Exploits

ScadaBR versions 10 and 11CE authenticated shell upload exploit written for Windows targets ...
ScadaBR versions 10 and 11CE authenticated shell upload exploit written for Linux targets ...

Github Repositories

POC CVE-2021-26828_ScadaBR_RemoteCodeExecution ScadaBR 091 on Linux and through 10 and 1124CE on Windows allows remote authenticated users to upload and execute arbitrary JSP files via 'view_editshtm' and Remote Code Execution Exploit Usage Commands: Windows: $ sudo python WinScada_RCEpy <Remote_Host> <Remote_Port> <User&a

ScadaBRExplorer This repository will be used for uploading multiple scripts! Please use responsibly, only for educational purposes Not responsible if you use this irresponsibly Credit: Exploit Author: Fellipe Oliveira CVE-2021-26828 (Kudos to Fellipe!) ScadaBR: wwwscadabrcombr/ Tested versions and OS: ScadaBR 10, ScadaBR 11CE on Linux, Windows 10 About the soft