Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by unauthenticated command injection. The url parameter of the function module downloadAndUpdate is vulnerable to an command Injection. Unfiltered user input is used to generate code which then gets executed when downloading new firmware.

Project Subscriptions

Vendors Products
Wallbox Glb Subscribe
Wallbox Glb Firmware Subscribe
Wallbox Gtb Subscribe
Wallbox Gtb Firmware Subscribe
Wallbox Gtc Subscribe
Wallbox Gtc Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-32592 Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by unauthenticated command injection. The url parameter of the function module downloadAndUpdate is vulnerable to an command Injection. Unfiltered user input is used to generate code which then gets executed when downloading new firmware.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T04:54:31.089Z

Reserved: 2021-12-27T00:00:00.000Z

Link: CVE-2021-45876

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-21T11:15:10.620

Modified: 2024-11-21T06:33:10.977

Link: CVE-2021-45876

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses