2022-11-29 05:16:28 +00:00
id : comtrend-password-exposure
2021-08-19 09:17:44 +00:00
info :
2022-10-10 19:22:59 +00:00
name : Comtrend ADSL - Remote Code Execution
2021-08-19 09:17:44 +00:00
author : geeknik
severity : high
2022-10-10 19:22:59 +00:00
description : Comtrend ADSL CT-5367 C01_R12 router is susceptible to remote code execution. A remote user can execute arbitrary commands via the telnet interface, The password for this interface is leaked to unauthenticated users via the password.cgi endpoint.
2022-04-22 10:38:41 +00:00
reference :
- https://www.exploit-db.com/exploits/16275
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : router,exposure,iot,rce,edb
2021-08-19 09:17:44 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-08-19 09:17:44 +00:00
- method : GET
path :
- "{{BaseURL}}/password.cgi"
matchers-condition : and
matchers :
- type : status
status :
- 200
- type : word
words :
- "pwdAdmin ="
- "pwdSupport ="
- "pwdUser ="
condition : and
2023-10-20 11:41:13 +00:00
# digest: 4b0a00483046022100ad2e20e1ed2593c7488c26ded0b9e5a4dc7ea62dfc3f8b44ae1e1f655b541fb40221009a250931b49d0a39559ceca51f6a97cfd33d25741e2bafc88d4acaedffe6e4db:922c64590222798bb761d5b6d8e72950