Metrics
Affected Vendors & Products
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System |
|
| Vendors & Products |
Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System |
Wed, 08 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC). | |
| Title | Tianxin Internet Behavior Management System Command Injection via toQuery.php | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-08T14:45:21.214Z
Reserved: 2026-01-15T20:57:10.582Z
Link: CVE-2021-4473
Updated: 2026-04-08T14:45:17.972Z
Status : Awaiting Analysis
Published: 2026-04-07T13:16:44.540
Modified: 2026-04-07T13:20:11.643
Link: CVE-2021-4473
No data.