Description |
Sunhillo specializes in surveillance data distribution and conversion for the Federal Aviation Administration, US Military, civil aviation authorities, and national defense organizations across the globe. Sunhillo SureLine has a command injection vulnerability which allows attacker to execute arbitrary commands, which can result into an interactive root reverse shell.
Sunhillo SureLine prior to 8.7.0.1.1 is vulnerable to CVE-2021-36380 |
||||||
CVE ID |
CVE-2021-36380 (https://nvd.nist.gov/vuln/detail/CVE-2021-36380) |
||||||
NDR Cloud Detection Rule |
FortiNDR Cloud v2024.3+
|
||||||
Playbook |
N/A | ||||||
Threat hunting |
FortiNDR Cloud users can use the following IOCs from Fortinet to hunt for “Sunhillo SureLine Command Injection Attack” related activities |
||||||
Suricata Coverage |
Customers can create custom investigation/detections using the Suricata signatures below: 2033459 → ET EXPLOIT Sunhillo SureLine Unauthenticated OS Command Injection Inbound (CVE-2021-36380) |
||||||
Other Fortinet Products |
For more details regarding mitigating the vulnerability by utilizing Fortinet products, please refer to |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.