Submit #524739: H3C Technologies Co., Ltd. H3C Magic NX30 Pro \ Magic NX15 \ H3C NX400 \ H3C Magic R3010 <=V100R014 Command Injectioninfo

TitleH3C Technologies Co., Ltd. H3C Magic NX30 Pro \ Magic NX15 \ H3C NX400 \ H3C Magic R3010 <=V100R014 Command Injection
DescriptionIn the `H3C Magic` home router series, including `H3C Magic NX30 Pro`, `Magic NX15`, `H3C NX400`, and `H3C Magic R3010`, an attacker can send a specially crafted `POST` request to the `/api/wizard/setsyncpppoecfg` endpoint without authorization, exploiting command injection to gain a root shell on the router.
Source⚠️ https://gist.github.com/mono7s/9369a3ef060b5655303cd234ba583bb5
User
 mono7s (UID 83092)
Submission03/21/2025 03:07 PM (2 months ago)
Moderation04/13/2025 02:28 PM (23 days later)
StatusAccepted
VulDB Entry304582 [H3C Magic NX15/Magic NX30 Pro/Magic NX400/Magic R3010 up to V100R014 HTTP POST Request setsyncpppoecfg FCGI_WizardProtoProcess command injection]
Points18

Do you know our Splunk app?

Download it now for free!