Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-35336

EPSS 85.76% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-35336

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Tieline IP Audio Gateway 2.6.4.8 and below is affected by Incorrect Access Control. A vulnerability in the Tieline Web Administrative Interface could allow an unauthenticated user to access a sensitive part of the system with a high privileged account.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tieline IP Audio Gateway 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
IP Audio Gateway是Tieline的一个音频编解码器。 Tieline IP Audio Gateway存在访问控制错误漏洞,该漏洞源于Tieline Web Administrative Interface中的漏洞可能允许未经身份验证的用户使用高特权帐户访问系统的敏感部分。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-35336

#POC DescriptionSource LinkShenlong Link
1Tieline IP Audio Gateway 2.6.4.8 and below is affected by a vulnerability in the web administrative interface that could allow an unauthenticated user to access a sensitive part of the system with a high privileged account.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-35336.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-35336

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-07-01 · 43 CVEs total

CVE-2020-36400ZeroMQ libzmq 缓冲区错误漏洞
CVE-2018-25017RawSpeed 缓冲区错误漏洞
CVE-2021-36087SELinux 缓冲区错误漏洞
CVE-2021-36088Fluent Bit 资源管理错误漏洞
CVE-2021-36086SELinux 资源管理错误漏洞
CVE-2021-36083KDE KImageFormats 缓冲区错误漏洞
CVE-2021-36082Keystone Engine 缓冲区错误漏洞
CVE-2021-36081tesseract 资源管理错误漏洞
CVE-2021-36080GNU LibreDWG 资源管理错误漏洞
CVE-2021-36084SELinux 资源管理错误漏洞
CVE-2021-36089Grok 缓冲区错误漏洞
CVE-2020-36401mruby 资源管理错误漏洞
CVE-2020-36402Solidity 缓冲区错误漏洞
CVE-2020-36403HTSlib 缓冲区错误漏洞
CVE-2020-36404Keystone Engine 安全漏洞
CVE-2020-36405Keystone Engine 资源管理错误漏洞
CVE-2020-36406uWebSockets 缓冲区错误漏洞
CVE-2020-36407libavif 缓冲区错误漏洞
CVE-2019-25048LibreSSL 缓冲区错误漏洞
CVE-2019-25049LibreSSL 缓冲区错误漏洞

Showing top 20 of 43 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-35336

No comments yet


Leave a comment