Vulnerability Details CVE-2021-38169
Roxy-WI through 5.2.2.0 allows command injection via /app/funct.py and /api/api_funct.py.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.032
EPSS Ranking 86.4%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2021-38169
-
cpe:2.3:a:roxy-wi:roxy-wi:-
-
cpe:2.3:a:roxy-wi:roxy-wi:1.0
-
cpe:2.3:a:roxy-wi:roxy-wi:1.1
-
cpe:2.3:a:roxy-wi:roxy-wi:1.10
-
cpe:2.3:a:roxy-wi:roxy-wi:1.10.1
-
cpe:2.3:a:roxy-wi:roxy-wi:1.10.2
-
cpe:2.3:a:roxy-wi:roxy-wi:1.10.2.1
-
cpe:2.3:a:roxy-wi:roxy-wi:1.3
-
cpe:2.3:a:roxy-wi:roxy-wi:1.4
-
cpe:2.3:a:roxy-wi:roxy-wi:1.4.1
-
cpe:2.3:a:roxy-wi:roxy-wi:1.6
-
cpe:2.3:a:roxy-wi:roxy-wi:1.9.1
-
cpe:2.3:a:roxy-wi:roxy-wi:2.0.2
-
cpe:2.3:a:roxy-wi:roxy-wi:3.2.13
-
cpe:2.3:a:roxy-wi:roxy-wi:3.3
-
cpe:2.3:a:roxy-wi:roxy-wi:3.4.4.6
-
cpe:2.3:a:roxy-wi:roxy-wi:3.4.4.7
-
cpe:2.3:a:roxy-wi:roxy-wi:3.4.5
-
cpe:2.3:a:roxy-wi:roxy-wi:3.4.5.1
-
cpe:2.3:a:roxy-wi:roxy-wi:4.4.1.0
-
cpe:2.3:a:roxy-wi:roxy-wi:5.1.1.0
-
cpe:2.3:a:roxy-wi:roxy-wi:5.1.4.0
-
cpe:2.3:a:roxy-wi:roxy-wi:5.2.0
-
cpe:2.3:a:roxy-wi:roxy-wi:5.2.1
-
cpe:2.3:a:roxy-wi:roxy-wi:5.2.2.0