Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-26729: CWE-94 Improper Control of Generation of Code ('Code Injection') in Lanner Inc IAC-AST2500A

0
Critical
VulnerabilityCVE-2021-26729cvecve-2021-26729cwe-94cwe-121
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Lanner Inc
Product: IAC-AST2500A

Description

Command injection and multiple stack-based buffer overflows vulnerabilities in the Login_handler_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:11:33 UTC

Technical Analysis

CVE-2021-26729 is a critical security vulnerability identified in the Lanner Inc IAC-AST2500A device, specifically affecting the standard firmware version 1.10.0. The vulnerability arises from improper control of code generation (CWE-94) and multiple stack-based buffer overflows (CWE-121) within the Login_handler_func function of the spx_restservice component. This flaw allows an unauthenticated remote attacker to perform command injection and exploit buffer overflow conditions, leading to arbitrary code execution with root-level privileges on the affected device. The vulnerability is remotely exploitable over the network without requiring any user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The severity is rated critical with a maximum CVSS score of 10.0, reflecting the complete compromise potential of confidentiality, integrity, and availability of the device. The vulnerability's exploitation scope is broad due to the network accessibility and lack of required privileges, making it a highly dangerous threat. No known public exploits have been reported in the wild to date, but the critical nature and ease of exploitation make it a prime target for attackers. The affected product, IAC-AST2500A, is an industrial-grade device often used in network infrastructure and industrial control systems, which increases the risk profile in operational environments.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those relying on Lanner Inc's IAC-AST2500A devices within their network or industrial control environments. Successful exploitation could lead to full system compromise, allowing attackers to execute arbitrary commands as root, potentially disrupting critical infrastructure, stealing sensitive data, or using the compromised device as a pivot point for further network intrusion. Given the device's role in industrial and network management, availability disruptions could affect manufacturing processes, utilities, or telecommunications. Confidentiality breaches could expose proprietary or personal data, violating GDPR and other regulatory requirements. The critical severity and remote exploitability without authentication increase the urgency for European organizations to address this vulnerability promptly to avoid operational, financial, and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should take the following specific actions: 1) Immediately identify and inventory all IAC-AST2500A devices running firmware version 1.10.0 within their environment. 2) Contact Lanner Inc for official firmware updates or patches addressing CVE-2021-26729; if unavailable, consider applying vendor-recommended workarounds or disabling the vulnerable spx_restservice component if feasible. 3) Implement network segmentation and strict access controls to isolate vulnerable devices from untrusted networks, limiting exposure to potential attackers. 4) Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting this vulnerability. 5) Monitor network traffic and device logs for unusual activity indicative of exploitation attempts or successful breaches. 6) Establish strict firewall rules to restrict access to management interfaces of the affected devices to trusted administrative networks only. 7) Develop an incident response plan specifically addressing potential exploitation scenarios of this vulnerability. 8) Engage in regular vulnerability scanning and penetration testing to verify the effectiveness of applied mitigations and detect any residual risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Nozomi
Date Reserved
2021-02-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd972f

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:11:33 PM

Last updated: 2/7/2026, 5:53:38 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats