PT-2021-17153 · Microsoft · Windows
H3V0X
·
Published
2021-06-11
·
Updated
2026-01-12
·
CVE-2021-26829
CVSS v2.0
5.5
5.5
Medium
| Base vector | Vector | AV:N/AC:L/Au:S/C:P/I:P/A:N |
Name of the Vulnerable Software and Affected Versions
OpenPLC ScadaBR versions through 0.9.1 on Linux and through 1.12.4 on Windows.
Description
OpenPLC ScadaBR is affected by a stored cross-site scripting (XSS) vulnerability in the
system settings.shtm file. This flaw allows attackers to execute malicious scripts in the context of a user's browser. The vulnerability has been actively exploited by the hacktivist group TwoNet, who successfully defaced a honeypot system simulating a water treatment facility within 26 hours of gaining initial access. The attack involved exploiting default credentials and utilizing the XSS vulnerability to disable system logs and alarms. The vulnerability is present in both Windows and Linux versions of the software. It is estimated that a significant number of devices worldwide may be vulnerable.API Endpoints:
/system settings.shtmVulnerable Parameters or Variables:
None explicitly mentioned.
Recommendations
OpenPLC ScadaBR versions through 0.9.1 on Linux should be updated to a newer, secure version.
OpenPLC ScadaBR versions through 1.12.4 on Windows should be updated to a newer, secure version.
Exploit
Fix
RCE
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-14902
CVE-2021-26829
Affected Products
Windows
References · 89
- 🔥 https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE⭐ 8 🔗 3 · Exploit
- 🔥 https://youtu.be/Xh6LPCiLMa8 · Exploit
- https://bdu.fstec.ru/vul/2025-14902 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2021-26829 · Security Note
- http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4 · Vendor Advisory
- https://github.com/SCADA-LTS/Scada-LTS/pull/3211⭐ 892 🔗 320 · Note
- https://github.com/SCADA-LTS/Scada-LTS/pull/3211/commits/032165e3e30e2b341905f1c3a8b8e3ba5519db7a⭐ 892 🔗 320 · Note
- https://github.com/SCADA-LTS/Scada-LTS⭐ 892 🔗 320 · Note
- https://twitter.com/PurpleOps_io/status/1995130830981566742 · Twitter Post
- https://twitter.com/CloudRangeCyber/status/1995538421788426380 · Twitter Post
- https://twitter.com/15MinuteNewsTec/status/1995146064870232526 · Twitter Post
- https://twitter.com/transilienceai/status/1995372510469067070 · Twitter Post
- https://twitter.com/cybernewslive/status/1996367613874860084 · Twitter Post
- https://t.me/cibsecurity/87924 · Telegram Post
- https://twitter.com/NetizenCorp/status/1995659483981267192 · Twitter Post