7.5
CVSSv2

CVE-2021-31251

Published: 04/06/2021 Updated: 08/06/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

chiyu-tech bf-430_firmware -

chiyu-tech bf-431_firmware -

chiyu-tech bf-450m_firmware -

chiyu-tech semac_s2_firmware -

chiyu-tech semac_d1_firmware -

chiyu-tech semac_d2_firmware -

chiyu-tech semac_d4_firmware -

chiyu-tech semac_s3v3_firmware -

chiyu-tech semac_d2_n300_firmware -

chiyu-tech semac_s1_osdp_firmware -

Exploits

Several IoT devices from the CHIYU Technology firm are vulnerable to a flaw that permits bypassing the telnet authentication process due to an overflow during the negotiation of the telnet protocol Telnet authentication is bypassed by supplying a specially malformed request, and an attacker may force the remote telnet server to believe that the us ...