CVE-2021-47747

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary system commands with administrative privileges in meterN energy monitoring software. Attackers can exploit POST parameters in admin scripts to achieve remote code execution. Organizations running meterN 1.2.3 are affected.

💻 Affected Systems

Products:
  • meterN
Versions: 1.2.3
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to admin scripts, but default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to other systems, or deploy ransomware.

🟠

Likely Case

Attackers gain administrative shell access to the meterN server, enabling data theft, system manipulation, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and proper input validation preventing command injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access but is trivial to execute once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://web.archive.org/web/20210617084455/https://www.metern.org/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to filter dangerous characters from COMMANDx and LIVECOMMANDx parameters

Modify admin_meter2.php and admin_indicator2.php to sanitize user input

File Restriction

linux

Restrict access to vulnerable admin scripts using web server configuration

# Apache: <Location "/admin_meter2.php"> Require all denied </Location>
# Nginx: location ~ /admin_meter2\.php$ { deny all; }

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate meterN systems from critical infrastructure
  • Enforce strong authentication policies and monitor for suspicious admin account activity

🔍 How to Verify

Check if Vulnerable:

Check if meterN version is 1.2.3 and admin_meter2.php/admin_indicator2.php scripts exist and accept POST parameters

Check Version:

Check meterN configuration files or web interface for version information

Verify Fix Applied:

Test if COMMANDx and LIVECOMMANDx parameters are properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • POST requests to admin_meter2.php or admin_indicator2.php with COMMANDx/LIVECOMMANDx parameters
  • Unusual system commands executed from web server process

Network Indicators:

  • HTTP POST requests containing shell metacharacters or command injection patterns

SIEM Query:

source="web_logs" AND (uri="/admin_meter2.php" OR uri="/admin_indicator2.php") AND (param="COMMAND" OR param="LIVECOMMAND")

🔗 References

📤 Share & Export