Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).

Project Subscriptions

Vendors Products
Beijing Topsec Network Security Subscribe
Tianxin Internet Behavior Management System Subscribe
Topsecgroup Subscribe
Tianxin Internet Behavior Management System Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 24 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Topsecgroup
Topsecgroup tianxin Internet Behavior Management System
CPEs cpe:2.3:a:topsecgroup:tianxin_internet_behavior_management_system:*:*:*:*:*:*:*:*
Vendors & Products Topsecgroup
Topsecgroup tianxin Internet Behavior Management System

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System
Vendors & Products Beijing Topsec Network Security
Beijing Topsec Network Security tianxin Internet Behavior Management System

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).
Title Tianxin Internet Behavior Management System Command Injection via toQuery.php
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-14T02:06:51.986Z

Reserved: 2026-01-15T20:57:10.582Z

Link: CVE-2021-4473

cve-icon Vulnrichment

Updated: 2026-04-08T14:45:17.972Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T13:16:44.540

Modified: 2026-04-24T15:12:17.307

Link: CVE-2021-4473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T08:45:27Z

Weaknesses