{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T08:21:47.398","vulnerabilities":[{"cve":{"id":"CVE-2021-20121","sourceIdentifier":"vulnreport@tenable.com","published":"2021-10-11T17:15:07.450","lastModified":"2024-11-21T05:45:57.780","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is vulnerable to an authenticated arbitrary file read. An authenticated user with physical access to the device can read arbitrary files from the device by preparing and connecting a specially prepared USB drive to the device, and making a series of crafted requests to the device's web interface."},{"lang":"es","value":"Telus Wi-Fi Hub (PRV65B444A-S-TS) con versión de firmware 3.00.20, es vulnerable a una lectura de archivos arbitraria autenticada. Un usuario autenticado con acceso físico al dispositivo puede leer archivos arbitrarios desde el dispositivo preparando y conectando una unidad USB especialmente preparada al dispositivo, y realizando una serie de peticiones diseñadas a la interfaz web del dispositivo"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.4,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:N/A:N","baseScore":1.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:telus:prv65b444a-s-ts_firmware:3.00.20:*:*:*:*:*:*:*","matchCriteriaId":"80DB4F46-06BC-438F-A685-C4C1A2ACA69B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:telus:prv65b444a-s-ts:-:*:*:*:*:*:*:*","matchCriteriaId":"0BE94241-E1DE-41E0-B9F3-E479A181A743"}]}]}],"references":[{"url":"https://www.tenable.com/security/research/tra-2021-41","source":"vulnreport@tenable.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.tenable.com/security/research/tra-2021-41","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}