{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:55:15.072","vulnerabilities":[{"cve":{"id":"CVE-2021-36706","sourceIdentifier":"cve@mitre.org","published":"2021-08-06T14:15:07.837","lastModified":"2024-11-21T06:13:56.900","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In ProLink PRC2402M V1.0.18 and older, the set_sys_cmd function in the adm.cgi binary, accessible with a page parameter value of sysCMD contains a trivial command injection where the value of the command parameter is passed directly to system."},{"lang":"es","value":"En ProLink PRC2402M versiones V1.0.18 y anteriores, la función set_sys_cmd en el binario adm.cgi, accesible con un valor de parámetro de página de sysCMD contiene una inyección de comando trivial donde el valor del parámetro de comando es pasado directamente al sistema"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:prolink:prc2402m_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.18","matchCriteriaId":"BF819F19-8016-4331-B6AF-3B71F1B2103C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:prolink:prc2402m:-:*:*:*:*:*:*:*","matchCriteriaId":"08223D6B-7E61-44BB-8D55-20007319B28E"}]}]}],"references":[{"url":"https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#syscmd-command-injection","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#syscmd-command-injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}