CVE-2021-4105
Description
Improper Handling of Parameters vulnerability in BG-TEK COSLAT Firewall allows Remote Code Inclusion.
This issue affects COSLAT Firewall: from 5.24.0.R.20180630 before 5.24.0.R.20210727.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An improper handling of parameters in BG-TEK COSLAT Firewall allows unauthenticated remote attackers to execute arbitrary code, leading to full system compromise.
The vulnerability, classified as CVE-2021-4105, is an Improper Handling of Parameters issue in BG-TEK's COSLAT Firewall. This flaw allows remote adversaries to inject and execute arbitrary code on the affected appliance. The root cause lies in insufficient validation or sanitization of user-supplied parameters, enabling code injection attacks.
Exploitation requires no authentication and can be carried out over the network, leveraging the firewall's management interface or other services that process parameter input. An attacker can craft malicious requests targeting the vulnerable parameter handling, leading to code execution with high privileges.
Successful exploitation results in Remote Code Inclusion, granting the attacker full control over the firewall device. This can lead to complete compromise of the network security boundary, allowing data exfiltration, rule manipulation, and lateral movement within the organization's infrastructure.
The vendor, BG-TEK, released a critical security update on July 27, 2021, in version 5.24.0.R.20210727, which addresses the vulnerability [1]. Users are strongly advised to upgrade to the patched version immediately. No alternative mitigation measures have been disclosed, and given the critical severity, prompt action is essential.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- BG-TEK/COSLAT Firewallv5Range: 5.24.0.r.20180630
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- blog.coslat.com/2021/07/onemli-kritik-guncelleme-2021-07-27.htmlnvdVendor Advisory
- www.usom.gov.tr/bildirim/tr-23-0108nvdThird Party Advisory
- siberguvenlik.gov.tr/guvenlik-bildirimleri/detay/tr-23-0108nvd
News mentions
0No linked articles in our index yet.