CVE-2021-4473

critical

Description

Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).

References

https://www.vulncheck.com/advisories/tianxin-internet-behavior-management-system-command-injection-via-toquery-php

https://www.cnvd.org.cn/patchInfo/show/280166

https://www.cnvd.org.cn/flaw/show/CNVD-2021-41972

https://cn-sec.com/archives/4631959.html

https://avd.aliyun.com/detail?id=AVD-2021-890232

Details

Source: Mitre, NVD

Published: 2026-04-07

Updated: 2026-04-07

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical