Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-46704 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: GenieACS suffers from **Unauthenticated OS Command Injection**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **Insufficient Input Validation** combined with a **Missing Authorization Check**.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **GenieACS** versions **< 1.2.8** (specifically >= 1.2.0). 🌐 **Component**: The UI interface API endpoint handling the `ping` host argument.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Full **OS Command Execution** on the host server.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. 🚫 **Auth**: **Unauthenticated**. No login or API key is required to trigger the vulnerability via the `ping` parameter. This makes it extremely dangerous.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp**: **YES**. Multiple PoCs are available on GitHub (e.g., `MithatGuner/CVE-2021-46704-POC`) and Nuclei templates exist for automated scanning. Wild exploitation is highly probable.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Use **Nuclei** with the CVE-2021-46704 template.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. Upgrade GenieACS to version **1.2.8** or higher. πŸ“ **Commit**: Fixed in commit `7f295beeecc1c1f14308a93c82413bb334045af6`.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is impossible, **block external access** to the GenieACS UI/API port.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 Since it is **unauthenticated** and allows **RCE**, it is a high-priority target for automated bots. Immediate patching or network isolation is required.