{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-21741","assignerOrgId":"6786b568-6808-4982-b61f-398b0d9679eb","assignerShortName":"zte","dateUpdated":"2024-08-03T18:23:28.495Z","dateReserved":"2021-01-04T00:00:00.000Z","datePublished":"2021-08-30T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6786b568-6808-4982-b61f-398b0d9679eb","shortName":"zte","dateUpdated":"2023-06-05T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"There is a command execution vulnerability in a ZTE conference management system. As some services are enabled by default, the attacker could exploit this vulnerability to execute arbitrary commands by sending specific serialization command."}],"affected":[{"vendor":"n/a","product":"ZXV10 M910","versions":[{"version":"ZXV10 M910 V1.2.21.01.04P01,ZXV10 M910 V1.2.20.01U01.01,ZXV10 M910 V1.2.19.01U01.01,ZXV10 M910 V1.2.16.01U01.01","status":"affected"}]}],"references":[{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1018424"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"command execution"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:23:28.495Z"},"title":"CVE Program Container","references":[{"url":"https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1018424","tags":["x_transferred"]}]}]}}