HD-Network Real-time Monitoring System 2.0 - Local File Inclusion CVE-2021-45043 Scanner

Details
Stay Up To Date
Asset Type

DOMAIN,IP

Need Membership

Yes

Asset Verify

Yes

API Support

Yes

Estimate Time (Second)

10

HD-Network Real-time Monitoring System 2.0 - Local File Inclusion CVE-2021-45043 Scanner Detail

In HD-Network Real-time Monitoring System 2.0, there is Local File Inclusion vulnerability.

HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter.

Some Advice for Common Problems

  • You need to apply related fixes.
  • Sanitize all parameters received as input from the user.

Need a Full Assessment?

Get help from professional hackers. Learn about our penetration test service now!

Request Pentest Service