6.5
CVSSv2

CVE-2021-33537

Published: 25/06/2021 Updated: 27/07/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

weidmueller ie-wl-bl-ap-cl-eu_firmware

weidmueller ie-wlt-bl-ap-cl-eu_firmware

weidmueller ie-wl-bl-ap-cl-us_firmware

weidmueller ie-wlt-bl-ap-cl-us_firmware

weidmueller ie-wl-vl-ap-br-cl-eu_firmware

weidmueller ie-wlt-vl-ap-br-cl-eu_firmware

weidmueller ie-wl-vl-ap-br-cl-us_firmware

weidmueller ie-wlt-vl-ap-br-cl-us_firmware