Skip to main content

CVE-2021-26731: CWE-94 Improper Control of Generation of Code ('Code Injection') in Lanner Inc IAC-AST2500A

Critical
VulnerabilityCVE-2021-26731cvecve-2021-26731cwe-94cwe-121
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Lanner Inc
Product: IAC-AST2500A

Description

Command injection and multiple stack-based buffer overflows vulnerabilities in the modifyUserb_func function of spx_restservice allow an authenticated attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:10:28 UTC

Technical Analysis

CVE-2021-26731 is a critical vulnerability affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability arises from improper control of code generation (CWE-94) and multiple stack-based buffer overflows (CWE-121) within the modifyUserb_func function of the spx_restservice component. Specifically, authenticated attackers can exploit command injection flaws and buffer overflow weaknesses to execute arbitrary code with root-level privileges on the affected device. The vulnerability is remotely exploitable over the network without user interaction but requires the attacker to have authenticated access, which implies some level of credential or session compromise is necessary. The CVSS v3.1 base score is 9.1 (critical), reflecting the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation given low attack complexity and no user interaction. The vulnerability affects the firmware version 1.10.0 of the IAC-AST2500A, a device likely used in industrial or network infrastructure contexts. No public exploits are currently known in the wild, but the severity and nature of the vulnerability make it a significant risk if exploited. The vulnerability allows an attacker to gain root shell access, potentially leading to full system compromise, data theft, disruption of services, or use of the device as a pivot point for further network attacks.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on Lanner Inc IAC-AST2500A devices in critical infrastructure, industrial control systems, or network edge devices. Successful exploitation could lead to complete system compromise, enabling attackers to manipulate or disrupt operational technology environments, exfiltrate sensitive data, or launch lateral movement attacks within corporate or industrial networks. Given the root-level access gained, attackers could disable security controls, install persistent malware, or cause denial of service conditions. This poses risks not only to confidentiality and integrity but also to availability, which is critical in industrial and infrastructure settings. The vulnerability's requirement for authentication means that insider threats or compromised credentials could facilitate exploitation, emphasizing the need for strong access controls. The lack of known public exploits currently provides a window for mitigation, but the critical severity score demands urgent attention to prevent potential targeted attacks against European entities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify all deployed Lanner Inc IAC-AST2500A devices running firmware version 1.10.0. Immediate steps include restricting access to the spx_restservice interface to trusted networks and users only, employing network segmentation to isolate vulnerable devices from broader enterprise networks. Strong authentication mechanisms should be enforced, including multi-factor authentication where possible, to reduce the risk of credential compromise. Monitoring and logging of access to the REST service should be enhanced to detect suspicious activities early. Since no official patch is currently listed, organizations should engage with Lanner Inc for firmware updates or security advisories and apply any available patches promptly. As a temporary workaround, disabling or restricting the modifyUserb_func functionality or the entire spx_restservice if feasible can reduce exposure. Regular vulnerability scanning and penetration testing focused on these devices should be conducted to verify the effectiveness of mitigations. Additionally, organizations should prepare incident response plans specific to potential exploitation scenarios involving these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Nozomi
Date Reserved
2021-02-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd96e6

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:10:28 PM

Last updated: 8/2/2025, 2:56:15 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats