Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-26731: CWE-94 Improper Control of Generation of Code ('Code Injection') in Lanner Inc IAC-AST2500A

0
Critical
VulnerabilityCVE-2021-26731cvecve-2021-26731cwe-94cwe-121
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Lanner Inc
Product: IAC-AST2500A

Description

Command injection and multiple stack-based buffer overflows vulnerabilities in the modifyUserb_func function of spx_restservice allow an authenticated attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:10:28 UTC

Technical Analysis

CVE-2021-26731 is a critical vulnerability affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability arises from improper control of code generation (CWE-94) and multiple stack-based buffer overflows (CWE-121) within the modifyUserb_func function of the spx_restservice component. Specifically, authenticated attackers can exploit command injection flaws and buffer overflow weaknesses to execute arbitrary code with root-level privileges on the affected device. The vulnerability is remotely exploitable over the network without user interaction but requires the attacker to have authenticated access, which implies some level of credential or session compromise is necessary. The CVSS v3.1 base score is 9.1 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation given low attack complexity and no user interaction. The vulnerability affects the firmware version 1.10.0 of the IAC-AST2500A, a device likely used in industrial or network infrastructure contexts. No public exploits are currently known in the wild, but the severity and nature of the vulnerability make it a significant risk if exploited. The vulnerability allows an attacker to gain root shell access, potentially leading to full system compromise, data theft, disruption of services, or use of the device as a pivot point for further network attacks.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on Lanner Inc IAC-AST2500A devices in critical infrastructure, industrial control systems, or network edge devices. Successful exploitation could lead to complete system compromise, enabling attackers to manipulate or disrupt operational technology environments, exfiltrate sensitive data, or launch lateral movement attacks within corporate or industrial networks. Given the root-level access gained, attackers could disable security controls, install persistent malware, or cause denial of service conditions. This poses risks not only to confidentiality and integrity but also to availability, which is critical in industrial and infrastructure settings. The vulnerability's requirement for authentication means that insider threats or compromised credentials could facilitate exploitation, emphasizing the need for strong access controls. The lack of known public exploits currently provides a window for mitigation, but the critical severity score demands urgent attention to prevent potential targeted attacks against European entities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify all deployed Lanner Inc IAC-AST2500A devices running firmware version 1.10.0. Immediate steps include restricting access to the spx_restservice interface to trusted networks and users only, employing network segmentation to isolate vulnerable devices from broader enterprise networks. Strong authentication mechanisms should be enforced, including multi-factor authentication where possible, to reduce the risk of credential compromise. Monitoring and logging of access to the REST service should be enhanced to detect suspicious activities early. Since no official patch is currently listed, organizations should engage with Lanner Inc for firmware updates or security advisories and apply any available patches promptly. As a temporary workaround, disabling or restricting the modifyUserb_func functionality or the entire spx_restservice if feasible can reduce exposure. Regular vulnerability scanning and penetration testing focused on these devices should be conducted to verify the effectiveness of mitigations. Additionally, organizations should prepare incident response plans specific to potential exploitation scenarios involving these devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Nozomi
Date Reserved
2021-02-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd96e6

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:10:28 PM

Last updated: 2/7/2026, 6:38:49 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats