6.5
CVSSv3

CVE-2021-27328

Published: 19/02/2021 Updated: 09/03/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 357
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An authenticated user can decrypt firmware and can read sensitive information, such as a password or decryption key.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

yeastar neogate_tg400_firmware 91.3.0.3

Exploits

Yeastar TG400 GSM Gateway version 91303 suffers from a path traversal vulnerability ...

Github Repositories

Path Traversal on Yeastar TG400 GSM Gateway - 91303 This is a Proof of Concept for CVE-2021-27328 Example to get firmware decrypting password 19216843246/cgi/WebCGI?1404=//////////bin/firmware_detect to get /etc/paswd 19216843246/cgi/WebCGI?1404=//////////etc/passwd

本项目涉及到的仅为安全研究和授权情况下使用,其使用人员有责任和义务遵守当地法律条规。

Yeastar-NeoGate 朗视 Yeastar NeoGate TG400 路径遍历漏洞CVE-2021-27328 描述 朗视 TG400 GSM 网关存在路径遍历 ,攻击者可以通过漏洞获取敏感信息 影响范围 朗视 TG400 GSM 网关91303 获取固件解密密码 /cgi/WebCGI?1404=//////////bin/firmware_detect /etc/passwd: /cgi/WebCGI?1404=//////////etc/