Cyber Posture

CVE-2021-4473

CriticalPublic PoC

Published: 07 April 2026

Published
07 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0543 90.2th percentile
Risk Priority 23 60% EPSS · 20% KEV · 20% CVSS

Description

Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability…

more

to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents command injection by requiring validation of the objClass parameter to reject shell metacharacters and output redirection.

prevent

AC-14 limits permitted actions without authentication, preventing unauthenticated attackers from accessing the vulnerable Reporter endpoint.

prevent

SI-2 requires timely flaw remediation by applying the fixed firmware version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin to eliminate the command injection vulnerability.

Security SummaryAI

CVE-2021-4473 is a command injection vulnerability (CWE-78) in the Tianxin Internet Behavior Management System, specifically in the Reporter component endpoint. The flaw allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction or privileges required, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Exploitation enables attackers to write malicious PHP files into the web root, resulting in remote code execution with the privileges of the web server process.

The vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Mitigation details are available in advisories from sources including Aliyun (AVD-2021-890232), CNVD (CNVD-2021-41972), and Vulncheck.

Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC). The CVE was published on 2026-04-07T13:16:44.540.

Details

CWE(s)

Affected Products

topsecgroup
tianxin internet behavior management system
≤ 4.0.0.7_20210716.180815

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unauthenticated command injection (T1190) in public-facing Reporter endpoint enables arbitrary Unix shell execution (T1059.004) and writing PHP web shells to web root (T1505.003) for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References