Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-4465
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-14 Nov, 2025 | 22:51
Updated At-05 Dec, 2025 | 12:08
Rejected At-
▼CVE Numbering Authority (CNA)
ReQuest Serious Play F3 Media Server <= 7.0.3 Remote DoS

ReQuest Serious Play F3 Media Server versions 7.0.3.4968 (Pro), 7.0.2.4954, 6.5.2.4954, 6.4.2.4681, 6.3.2.4203, and 2.0.1.823 contain a remote denial-of-service vulnerability. The device can be shut down or rebooted by an unauthenticated attacker through a single crafted HTTP GET request, allowing remote interruption of service availability.

Affected Products
Vendor
ReQuest Serious Play LLC
Product
ReQuest Serious Play Pro
Default Status
unknown
Versions
Affected
  • 7.0.3.4968
Vendor
ReQuest Serious Play LLC
Product
ReQuest Serious Play
Default Status
unknown
Versions
Affected
  • 7.0.2.4954
  • 6.5.2.4954
  • 6.4.2.4681
  • 6.3.2.4203
  • 2.0.1.823
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400 Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-400
Description: CWE-400 Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-227CAPEC-227 Sustained Client Engagement
CAPEC ID: CAPEC-227
Description: CAPEC-227 Sustained Client Engagement
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Gjoko Krstic of Zero Science Lab
Timeline
EventDate
ZSL-2020-5601 is publicly disclosed.2020-10-18 16:00:00
Event: ZSL-2020-5601 is publicly disclosed.
Date: 2020-10-18 16:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5601.php
technical-description
exploit
https://www.exploit-db.com/exploits/48951
exploit
https://packetstorm.news/files/id/159602
exploit
https://cxsecurity.com/issue/WLB-2020100122
exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/190031
vdb-entry
http://www.request.com/
product
https://www.vulncheck.com/advisories/request-serious-play-f3-media-server-remote-dos
third-party-advisory
Hyperlink: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5601.php
Resource:
technical-description
exploit
Hyperlink: https://www.exploit-db.com/exploits/48951
Resource:
exploit
Hyperlink: https://packetstorm.news/files/id/159602
Resource:
exploit
Hyperlink: https://cxsecurity.com/issue/WLB-2020100122
Resource:
exploit
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/190031
Resource:
vdb-entry
Hyperlink: http://www.request.com/
Resource:
product
Hyperlink: https://www.vulncheck.com/advisories/request-serious-play-f3-media-server-remote-dos
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5601.php
exploit
https://www.exploit-db.com/exploits/48951
exploit
https://cxsecurity.com/issue/WLB-2020100122
exploit
Hyperlink: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5601.php
Resource:
exploit
Hyperlink: https://www.exploit-db.com/exploits/48951
Resource:
exploit
Hyperlink: https://cxsecurity.com/issue/WLB-2020100122
Resource:
exploit
Details not found