Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System |
|
| Vendors & Products |
Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System |
Wed, 08 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC). | |
| Title | Tianxin Internet Behavior Management System Command Injection via toQuery.php | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-08T14:45:21.214Z
Reserved: 2026-01-15T20:57:10.582Z
Link: CVE-2021-4473
Updated: 2026-04-08T14:45:17.972Z
Status : Awaiting Analysis
Published: 2026-04-07T13:16:44.540
Modified: 2026-04-07T13:20:11.643
Link: CVE-2021-4473
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:49:34Z