Home

Description

Cypress Solutions CTM-200 2.7.1 contains an authenticated command injection vulnerability in the firmware upgrade script that allows remote attackers to execute shell commands. Attackers can exploit the 'fw_url' parameter in the ctm-config-upgrade.sh script to inject and execute arbitrary commands with root privileges.

PUBLISHED Reserved 2025-12-31 | Published 2025-12-31 | Updated 2026-01-05 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

2.7.1
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/50408 (ExploitDB-50408) exploit

www.cypress.bc.ca (Cypress Solutions Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5687.php (Zero Science Lab Disclosure (ZSL-2021-5687)) third-party-advisory

www.vulncheck.com/...-command-injection-via-firmware-upgrade (VulnCheck Advisory: Cypress Solutions CTM-200 2.7.1 Root Remote OS Command Injection via Firmware Upgrade) third-party-advisory

cve.org (CVE-2021-47745)

nvd.nist.gov (CVE-2021-47745)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.