CVE-2021-4465
BaseFortify
Publication date: 2025-11-14
Last updated on: 2025-11-18
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| request | serious_play_f3_media_server | 6.3.2.4203 |
| request | serious_play_f3_media_server | 6.5.2.4954 |
| request | serious_play_f3_media_server | 7.0.3.4968 |
| request | serious_play_f3_media_server | 7.0.2.4954 |
| request | serious_play_f3_media_server | 6.4.2.4681 |
| request | serious_play_f3_media_server | 2.0.1.823 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in ReQuest Serious Play F3 Media Server versions 7.0.3.4968 (Pro), 7.0.2.4954, 6.5.2.4954, 6.4.2.4681, 6.3.2.4203, and 2.0.1.823. It allows an unauthenticated attacker to cause a remote denial-of-service by sending a single crafted HTTP GET request, which can shut down or reboot the device, interrupting service availability.
How can this vulnerability impact me? :
The impact of this vulnerability is a remote denial-of-service condition where an attacker can shut down or reboot the affected media server remotely without authentication. This results in interruption of service availability, potentially causing downtime and disruption of operations relying on the media server.