{"vulnerability": "CVE-2021-2174", "sightings": [{"uuid": "601aadb5-a7e9-488c-a393-db6848f974f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-21745.yaml", "content": "", "creation_timestamp": "2023-04-27T09:58:59.000000Z"}, {"uuid": "001bc370-565d-4b4a-9f0d-278f837754cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-04)", "content": "", "creation_timestamp": "2025-02-04T00:00:00.000000Z"}, {"uuid": "38615c9b-93c1-4130-b0cc-2130e88f7026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "a3f2719e-a76b-44bb-99e9-2c857d2a6a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "8c037b8e-c738-4d54-9186-a4b871ef35aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-03)", "content": "", "creation_timestamp": "2025-11-03T00:00:00.000000Z"}, {"uuid": "9d3ee811-4e54-4cb9-8f3d-83a074aa94fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-26)", "content": "", "creation_timestamp": "2025-02-26T00:00:00.000000Z"}, {"uuid": "a7ad040b-c96b-4569-8826-66f6e295b5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "94981e8a-ef88-4773-8edf-a7cd5f9c8ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "b6915568-79d1-44ef-8c89-bbc48ba287fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "613edd2c-2d9b-49b7-ac0b-2583b6a0cb02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-28)", "content": "", "creation_timestamp": "2025-02-28T00:00:00.000000Z"}, {"uuid": "3fccfe33-ec57-4548-b9db-deb15b26ef3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-06)", "content": "", "creation_timestamp": "2025-04-06T00:00:00.000000Z"}, {"uuid": "f1077608-df6e-4312-9073-936867f272e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "33679155-a566-4685-a7f0-7ae4c4445390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "03f5b42f-c70e-46f1-92df-e250ee1c4e1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "b19704f9-ea37-4374-a973-78cc87895130", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-13)", "content": "", "creation_timestamp": "2026-02-13T00:00:00.000000Z"}, {"uuid": "d35713fe-f984-487c-b8f8-2d6c44035950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "c9981cc1-3990-4264-bf07-effabbee5275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "4f48a5c9-0aa4-4878-905b-1c3139b1f87d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2174", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-02", "content": "", "creation_timestamp": "2026-01-27T11:00:00.000000Z"}, {"uuid": "844eded8-5421-46ff-a1e9-f7194bce0b89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-04)", "content": "", "creation_timestamp": "2026-01-04T00:00:00.000000Z"}, {"uuid": "2caf523d-85f4-438b-844f-6573f53a94c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-19)", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "695ae2ab-7ea1-4aef-a6cb-094a6a96bb0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-05)", "content": "", "creation_timestamp": "2026-04-05T00:00:00.000000Z"}, {"uuid": "bbe94388-4d02-46f7-ab20-3591d9557c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-20)", "content": "", "creation_timestamp": "2026-01-20T00:00:00.000000Z"}, {"uuid": "a6bee726-f6cb-4c84-8d97-51cb1be13c10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-23)", "content": "", "creation_timestamp": "2026-03-23T00:00:00.000000Z"}, {"uuid": "e0bdde7d-1a3e-4e83-a823-c9fc0702988a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-15)", "content": "", "creation_timestamp": "2026-04-15T00:00:00.000000Z"}, {"uuid": "a44a9848-760e-4d61-9706-5da1460eb058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21749", "type": "seen", "source": "https://t.me/cibsecurity/30905", "content": "\u203c CVE-2021-21749 \u203c\n\nZTE MF971R product has two stack-based buffer overflow vulnerabilities. An attacker could exploit the vulnerabilities to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-20T20:35:29.000000Z"}, {"uuid": "8dba0083-ef2c-44d3-9505-e5ef0e96688e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21746", "type": "seen", "source": "https://t.me/cibsecurity/30902", "content": "\u203c CVE-2021-21746 \u203c\n\nZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-20T18:35:24.000000Z"}, {"uuid": "75547e5c-ad38-4f1f-aeec-0bbcd3c43384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21747", "type": "seen", "source": "https://t.me/cibsecurity/30900", "content": "\u203c CVE-2021-21747 \u203c\n\nZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-20T18:35:22.000000Z"}, {"uuid": "f31ee567-6910-4b55-b842-0e6e52e98c81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21740", "type": "seen", "source": "https://t.me/cibsecurity/27018", "content": "\u203c CVE-2021-21740 \u203c\n\nThere is an information leak vulnerability in the digital media player (DMS) of ZTE's residential gateway product. The attacker could insert the USB disk with the symbolic link into the residential gateway, and access unauthorized directory information through the symbolic link, causing information leak.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T20:37:08.000000Z"}, {"uuid": "a3f6d809-f0eb-4aa3-9350-8edb97afc1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2174", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5992", "content": "|       PRION:CVE-2018-3067     4.0     https://vulners.com/prion/PRION:CVE-2018-3067               |       PRION:CVE-2018-3065     4.0     https://vulners.com/prion/PRION:CVE-2018-3065               |       PRION:CVE-2018-3056     4.0     https://vulners.com/prion/PRION:CVE-2018-3056               |       PRION:CVE-2018-3054     4.0     https://vulners.com/prion/PRION:CVE-2018-3054               |       PRION:CVE-2019-2503     3.8     https://vulners.com/prion/PRION:CVE-2019-2503               |       PRION:CVE-2023-22053    3.6     https://vulners.com/prion/PRION:CVE-2023-22053\n|       PRION:CVE-2019-2739     3.6     https://vulners.com/prion/PRION:CVE-2019-2739\n|       PRION:CVE-2022-21302    3.5     https://vulners.com/prion/PRION:CVE-2022-21302\n|       PRION:CVE-2021-35608    3.5     https://vulners.com/prion/PRION:CVE-2021-35608              |       PRION:CVE-2021-2174     3.5     https://vulners.com/prion/PRION:CVE-2021-2174\n|       PRION:CVE-2021-2171     3.5     https://vulners.com/prion/PRION:CVE-2021-2171               |       PRION:CVE-2020-2930     3.5     https://vulners.com/prion/PRION:CVE-2020-2930\n|       PRION:CVE-2020-2926     3.5     https://vulners.com/prion/PRION:CVE-2020-2926\n|       PRION:CVE-2020-2921     3.5     https://vulners.com/prion/PRION:CVE-2020-2921               |       PRION:CVE-2020-2752     3.5     https://vulners.com/prion/PRION:CVE-2020-2752               |       PRION:CVE-2020-2694     3.5     https://vulners.com/prion/PRION:CVE-2020-2694               |       PRION:CVE-2020-2584     3.5     https://vulners.com/prion/PRION:CVE-2020-2584\n|       PRION:CVE-2020-14791    3.5     https://vulners.com/prion/PRION:CVE-2020-14791\n|       PRION:CVE-2020-14771    3.5     https://vulners.com/prion/PRION:CVE-2020-14771\n|       PRION:CVE-2020-14550    3.5     https://vulners.com/prion/PRION:CVE-2020-14550\n|       PRION:CVE-2019-3018     3.5     https://vulners.com/prion/PRION:CVE-2019-3018               |       PRION:CVE-2019-2993     3.5     https://vulners.com/prion/PRION:CVE-2019-2993\n|       PRION:CVE-2019-2938     3.5     https://vulners.com/prion/PRION:CVE-2019-2938\n|       PRION:CVE-2019-2814     3.5     https://vulners.com/prion/PRION:CVE-2019-2814\n|       PRION:CVE-2019-2743     3.5     https://vulners.com/prion/PRION:CVE-2019-2743\n|       PRION:CVE-2019-2741     3.5     https://vulners.com/prion/PRION:CVE-2019-2741\n|       PRION:CVE-2019-2738     3.5     https://vulners.com/prion/PRION:CVE-2019-2738               |       PRION:CVE-2019-2636     3.5     https://vulners.com/prion/PRION:CVE-2019-2636\n|       PRION:CVE-2019-2630     3.5     https://vulners.com/prion/PRION:CVE-2019-2630\n|       PRION:CVE-2019-2623     3.5     https://vulners.com/prion/PRION:CVE-2019-2623               |       PRION:CVE-2019-2617     3.5     https://vulners.com/prion/PRION:CVE-2019-2617               |       PRION:CVE-2019-2614     3.5     https://vulners.com/prion/PRION:CVE-2019-2614               |       PRION:CVE-2018-3284     3.5     https://vulners.com/prion/PRION:CVE-2018-3284               |       PRION:CVE-2018-3283     3.5     https://vulners.com/prion/PRION:CVE-2018-3283\n|       PRION:CVE-2018-3074     3.5     https://vulners.com/prion/PRION:CVE-2018-3074               |       PRION:CVE-2018-3062     3.5     https://vulners.com/prion/PRION:CVE-2018-3062\n|       PRION:CVE-2023-22115    3.3     https://vulners.com/prion/PRION:CVE-2023-22115\n|       PRION:CVE-2023-22114    3.3     https://vulners.com/prion/PRION:CVE-2023-22114              |       PRION:CVE-2023-22113    3.3     https://vulners.com/prion/PRION:CVE-2023-22113              |       PRION:CVE-2023-22112    3.3     https://vulners.com/prion/PRION:CVE-2023-22112\n|       PRION:CVE-2023-22111    3.3     https://vulners.com/prion/PRION:CVE-2023-22111", "creation_timestamp": "2023-11-15T16:53:23.000000Z"}, {"uuid": "4af6e92c-f264-44b0-a15d-d426587aa9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21748", "type": "seen", "source": "https://t.me/cibsecurity/30909", "content": "\u203c CVE-2021-21748 \u203c\n\nZTE MF971R product has two stack-based buffer overflow vulnerabilities. An attacker could exploit the vulnerabilities to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-20T20:35:34.000000Z"}, {"uuid": "60efce32-3097-4de5-ae2e-b2a77a755b6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21745", "type": "seen", "source": "https://t.me/cibsecurity/30908", "content": "\u203c CVE-2021-21745 \u203c\n\nZTE MF971R product has a Referer authentication bypass vulnerability. Without CSRF verification, an attackercould use this vulnerability to perform illegal authorization operations by sending a request to the user to click.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-20T20:35:33.000000Z"}, {"uuid": "4e4646c8-6e1b-451e-af7b-cce21e78c112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21744", "type": "seen", "source": "https://t.me/cibsecurity/30907", "content": "\u203c CVE-2021-21744 \u203c\n\nZTE MF971R product has a configuration file control vulnerability. An attacker could use this vulnerability to modify the configuration parameters of the device, causing some security functions of the device to be disabled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-20T20:35:31.000000Z"}, {"uuid": "aaafe53a-45bd-488f-aa25-9af29a8ae6df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21743", "type": "seen", "source": "https://t.me/cibsecurity/30906", "content": "\u203c CVE-2021-21743 \u203c\n\nZTE MF971R product has a CRLF injection vulnerability. An attacker could exploit the vulnerability to modify the HTTP response header information through a specially crafted HTTP request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-20T20:35:30.000000Z"}, {"uuid": "b84b6011-a6e8-4d7e-aa29-efb640fcfdd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21742", "type": "seen", "source": "https://t.me/cibsecurity/29412", "content": "\u203c CVE-2021-21742 \u203c\n\nThere is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-25T07:36:37.000000Z"}]}