7.2
HIGH
CVE-2021-30166
Amcrest NTP Server Command Injection Vulnerability
Description

The NTP Server configuration function of the IP camera device is not verified with special parameters. Remote attackers can perform a command Injection attack and execute arbitrary commands after logging in with the privileged permission.

INFO

Published Date :

April 28, 2021, 10:15 a.m.

Last Modified :

Nov. 21, 2024, 6:03 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

1.2
Affected Products

The following products are affected by CVE-2021-30166 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Meritlilin p2r8852e2_firmware
2 Meritlilin p2r8852e4_firmware
3 Meritlilin p2r6852e2_firmware
4 Meritlilin p2r6852e4_firmware
5 Meritlilin p2r6552e2_firmware
6 Meritlilin p2r6552e4_firmware
7 Meritlilin p2r6352ae2_firmware
8 Meritlilin p2r6352ae4_firmware
9 Meritlilin p2r3052ae2_firmware
10 Meritlilin p2g1052_firmware
11 Meritlilin p2r8822e2_firmware
12 Meritlilin p2r8822e4_firmware
13 Meritlilin p2r6822e2_firmware
14 Meritlilin p2r6822e4_firmware
15 Meritlilin p2r6522e2_firmware
16 Meritlilin p2r6522e4_firmware
17 Meritlilin p2r6322ae2_firmware
18 Meritlilin p2r6322ae4_firmware
19 Meritlilin p2r3022ae2_firmware
20 Meritlilin p2g1022_firmware
21 Meritlilin p2g1022x_firmware
22 Meritlilin z2r8852ax_firmware
23 Meritlilin z2r8152x-p_firmware
24 Meritlilin z2r8152x2-p_firmware
25 Meritlilin z2r8052ex25_firmware
26 Meritlilin z2r6552x_firmware
27 Meritlilin z2r6452ax_firmware
28 Meritlilin z2r6452ax-p_firmware
29 Meritlilin z2r8822ax_firmware
30 Meritlilin z2r8122x-p_firmware
31 Meritlilin z2r8122x2-p_firmware
32 Meritlilin z2r8022ex25_firmware
33 Meritlilin z2r6522x_firmware
34 Meritlilin z2r6422ax_firmware
35 Meritlilin z2r6422ax-p_firmware
36 Meritlilin p3r6322e2_firmware
37 Meritlilin p3r6522e2_firmware
38 Meritlilin p3r8822e2_firmware
39 Meritlilin z3r6422x3_firmware
40 Meritlilin z3r6522x_firmware
41 Meritlilin z3r8922x3_firmware
42 Meritlilin p2r8852e2
43 Meritlilin p2r8852e4
44 Meritlilin p2r6852e2
45 Meritlilin p2r6852e4
46 Meritlilin p2r6552e2
47 Meritlilin p2r6552e4
48 Meritlilin p2r6352ae2
49 Meritlilin p2r6352ae4
50 Meritlilin p2r3052ae2
51 Meritlilin p2g1052
52 Meritlilin p2r8822e2
53 Meritlilin p2r8822e4
54 Meritlilin p2r6822e2
55 Meritlilin p2r6822e4
56 Meritlilin p2r6522e2
57 Meritlilin p2r6522e4
58 Meritlilin p2r6322ae2
59 Meritlilin p2r6322ae4
60 Meritlilin p2r3022ae2
61 Meritlilin p2g1022
62 Meritlilin p2g1022x
63 Meritlilin z2r8852ax
64 Meritlilin z2r8152x-p
65 Meritlilin z2r8152x2-p
66 Meritlilin z2r8052ex25
67 Meritlilin z2r6552x
68 Meritlilin z2r6452ax
69 Meritlilin z2r6452ax-p
70 Meritlilin z2r8822ax
71 Meritlilin z2r8122x-p
72 Meritlilin z2r8122x2-p
73 Meritlilin z2r8022ex25
74 Meritlilin z2r6522x
75 Meritlilin z2r6422ax
76 Meritlilin z2r6422ax-p
77 Meritlilin p3r6322e2
78 Meritlilin p3r6522e2
79 Meritlilin p3r8822e2
80 Meritlilin z3r6422x3
81 Meritlilin z3r6522x
82 Meritlilin z3r8922x3
References to Advisories, Solutions, and Tools

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-30166 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-30166 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e
    Added Reference https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388
    Added Reference https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf
    Added Reference https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    May. 05, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:S/C:C/I:C/A:C)
    Changed Reference Type https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e No Types Assigned https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e Third Party Advisory
    Changed Reference Type https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388 No Types Assigned https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388 Third Party Advisory
    Changed Reference Type https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf No Types Assigned https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf Vendor Advisory
    Changed Reference Type https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html No Types Assigned https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html Third Party Advisory
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8852e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8852e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8852e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8852e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6852e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6852e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6852e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6852e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6552e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6552e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6552e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6552e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6352ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6352ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6352ae4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6352ae4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r3052ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r3052ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2g1052_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2g1052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8822e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8822e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r8822e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r8822e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6822e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6822e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6822e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6822e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6522e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6522e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6522e4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6522e4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6322ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6322ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r6322ae4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r6322ae4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2r3022ae2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2r3022ae2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2g1022_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2g1022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p2g1022x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p2g1022x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8852ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8852ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8152x-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8152x-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8152x2-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8152x2-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8052ex25_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8052ex25:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6552x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6552x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6452ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6452ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6452ax-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6452ax-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8822ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8822ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8122x-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8122x-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8122x2-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8122x2-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r8022ex25_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r8022ex25:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6522x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6522x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6422ax_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6422ax:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z2r6422ax-p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z2r6422ax-p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p3r6322e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p3r6322e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p3r6522e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p3r6522e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:p3r8822e2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:p3r8822e2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z3r6422x3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z3r6422x3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z3r6522x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z3r6522x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:meritlilin:z3r8922x3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.1.94.8908 OR cpe:2.3:h:meritlilin:z3r8922x3:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-30166 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

6.05 }} -6.45%

score

0.89787

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Jun. 23, 2025 0:13