Security for everyone

CVE-2021-28151 Scanner

Detects 'Command Injection' vulnerability in Hongdian H8922 affects v. 3.0.5.

SCAN NOW

Short Info


Level

High

Type

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2021-28151 Scanner Detail

The Hongdian H8922 is a device used for remote monitoring and management of network infrastructure. Specifically, it is used to monitor and manage industrial control systems, such as SCADA (Supervisory Control and Data Acquisition) networks. The device connects to both ethernet and serial networks and has a range of features that allow for quick and efficient troubleshooting of any issues that arise.

One of the vulnerabilities detected in the Hongdian H8922 is CVE-2021-28151. This vulnerability allows for OS command injection via shell metacharacters into the ip-address field of the tools.cgi ping command. This vulnerability is accessible to anyone with the username guest and password guest and could potentially allow an attacker to execute malicious code on the device.

Exploiting this vulnerability could lead to a range of consequences for a company or organization. An attacker could easily gain access to sensitive information or take control of key systems, potentially leading to expensive outages or even damage to physical infrastructure. This vulnerability should therefore be taken seriously and addressed as quickly as possible to avoid any potential negative impacts.

Overall, it is important for companies and organizations to be aware of vulnerabilities like CVE-2021-28151 and take proactive steps to protect their digital assets. By using a platform like securityforeveryone.com, companies can stay informed about the latest known vulnerabilities and take action quickly to maintain the security of their network infrastructure. Don't hesitate to invest in the protection of your systems and take the necessary steps to keep them secure.

 

REFERENCES

cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture