POC详情: df63da6ac24029e7278d681be9ead1bdf571ce47

来源
关联漏洞
标题: Green Packet OH736 命令注入漏洞 (CVE-2023-26866)
描述:Green Packet OH736是美国Green Packet公司的一款路由器。 Green Packet OH736 的 WR-1200 Indoor Unit、OT-235 M-IDU-1.6.0.3_V1.1版本、MH-46360-2.0.3-R5-GP版本存在安全漏洞。攻击者利用该漏洞可以完全接管root权限执行任何操作。
介绍
 
# CVE-2023-26866

## Description
GreenPacket OH736's WR-1200 Indoor Unit, OT-235  with firmware versions M-IDU-1.6.0.3_V1.1 and MH-46360-2.0.3-R5-GP respectively  are vulnerable to remote command injection. Commands are executed using pre-login execution and executed with root privileges allowing complete takeover. The vulnerability has been   validated by Lionel Musonza.

## Vulnerability Type
CWE-77	Improper Neutralization of Special Elements used in a Command ('Command Injection')	cwe source acceptance level NIST  
CWE-94	Improper Control of Generation of Code ('Code Injection')

## Vendor of Product
GreenPacket

## Affected Product Code Base
OH736's WR-1200 IDU - M-IDU-1.6.0.3_V1.1
OT-235 - MH-46360-2.0.3-R5-GP


### Affected Component
Engineer  user's command tool in the ruoter's web utility.

### Attack Type
Context-dependent

### Impact Code execution
True

### Impact Denial of Service
True

### Impact Escalation of Privileges
True

### Impact Information Disclosure
True

## Has vendor confirmed or acknowledged the vulnerability?
No, no response from vendor.


## Discoverer
Lionel Musonza

## Timeline

文件快照

[4.0K] /data/pocs/df63da6ac24029e7278d681be9ead1bdf571ce47 └── [1.2K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。