{"vulnerability": "CVE-2021-27391", "sightings": [{"uuid": "e1bca010-b8ed-4205-bc5b-958ef25fa2b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-27391", "type": "seen", "source": "https://t.me/cibsecurity/28783", "content": "\u203c CVE-2021-27391 \u203c\n\nA vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions &gt;= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions &gt;= V2.6.3), APOGEE PXC Compact (BACnet) (All versions &lt; V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions &gt;= V2.8), APOGEE PXC Modular (BACnet) (All versions &lt; V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions &gt;= V2.8), TALON TC Compact (BACnet) (All versions &lt; V3.5.3), TALON TC Modular (BACnet) (All versions &lt; V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-14T14:21:05.000000Z"}]}