{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T20:24:35.447","vulnerabilities":[{"cve":{"id":"CVE-2021-32534","sourceIdentifier":"twcert@cert.org.tw","published":"2021-07-07T14:15:12.030","lastModified":"2024-11-21T06:07:13.080","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0."},{"lang":"es","value":"La función de restablecimiento de fábrica de QSAN SANOS no filtra los parámetros especiales. Los atacantes remotos pueden utilizar esta vulnerabilidad para inyectar y ejecutar comandos arbitrarios sin permisos. La referida vulnerabilidad ha sido resuelta con la versión actualizada de QSAN SANOS versión v2.1.0"}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qsan:sanos:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.0","matchCriteriaId":"85D922DA-3B01-496D-8362-1E0745AEA2BC"}]}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}