A conference management system of ZTE is impacted by a command execution vulnerability. Since the soapmonitor's java object service is enabled by default, the attacker could exploit this vulnerability to execute arbitrary commands by sending a deserialized payload to port 5001.
References
| Link | Resource |
|---|---|
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1018424 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2021-08-30 18:15
Updated : 2021-09-07 14:04
NVD link : CVE-2021-21741
Mitre link : CVE-2021-21741
JSON object : View
Products Affected
zte
- zxv10_m910_firmware
- zxv10_m910
CWE
CWE-502
Deserialization of Untrusted Data
