9.8
CVSSv3

CVE-2021-31251

Published: 04/06/2021 Updated: 08/06/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

chiyu-tech bf-430 firmware -

chiyu-tech bf-431 firmware -

chiyu-tech bf-450m firmware -

chiyu-tech semac s2 firmware -

chiyu-tech semac d1 firmware -

chiyu-tech semac d2 firmware -

chiyu-tech semac d4 firmware -

chiyu-tech semac s3v3 firmware -

chiyu-tech semac d2 n300 firmware -

chiyu-tech semac s1 osdp firmware -

Exploits

Several IoT devices from the CHIYU Technology firm are vulnerable to a flaw that permits bypassing the telnet authentication process due to an overflow during the negotiation of the telnet protocol Telnet authentication is bypassed by supplying a specially malformed request, and an attacker may force the remote telnet server to believe that the us ...