Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-47726
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-31 Dec, 2025 | 18:39
Updated At-02 Jan, 2026 | 20:08
Rejected At-
▼CVE Numbering Authority (CNA)
NuCom 11N Wireless Router 5.07.90 Privilege Escalation via Configuration Backup

NuCom 11N Wireless Router 5.07.90 contains a privilege escalation vulnerability that allows non-privileged users to access administrative credentials through the configuration backup endpoint. Attackers can send a crafted HTTP GET request to the backup configuration page with a specific cookie to retrieve and decode the admin password in Base64 format.

Affected Products
Vendor
Nucom
Product
NuCom 11N Wireless Router
Versions
Affected
  • 5.07.90
Problem Types
TypeCWE IDDescription
CWECWE-522Insufficiently Protected Credentials
Type: CWE
CWE ID: CWE-522
Description: Insufficiently Protected Credentials
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
LiquidWorm as Gjoko Krstic of Zero Science Lab
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.exploit-db.com/exploits/49634
exploit
https://www.nucom.es
product
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5629.php
third-party-advisory
https://www.vulncheck.com/advisories/nucom-n-wireless-router-privilege-escalation-via-configuration-backup
third-party-advisory
Hyperlink: https://www.exploit-db.com/exploits/49634
Resource:
exploit
Hyperlink: https://www.nucom.es
Resource:
product
Hyperlink: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5629.php
Resource:
third-party-advisory
Hyperlink: https://www.vulncheck.com/advisories/nucom-n-wireless-router-privilege-escalation-via-configuration-backup
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found