# N/A
### 概述
Wavlink AC1200 路由器在特定固件版本中存在一个**命令注入漏洞**,攻击者在认证后可通过该漏洞执行任意命令。
### 影响版本
- `M32A3_V1410_230602`
- `M32A3_V1410_240222`
### 细节
漏洞存在于 `adm.cgi` 二进制文件中的 `"set_sys_adm"` 函数中,攻击者在重置密码时,可控制用户输入的 `"newpass"` 字段,造成命令注入。
### 影响
攻击者在成功通过身份验证后,可利用该漏洞注入并执行任意系统命令,可能导致系统被完全控制。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifically found within the "set_sys_adm" function of the "adm.cgi" binary, and is due to improper santization of the user provided "newpass" field. | https://github.com/L41KAA/CVE-2024-48705 | POC详情 |
标题: 【New message】Home and Business Networking Equipment &Wireless Audio and Video Transmission Equipment -Wavlink.com -- 🔗来源链接
标签:
神龙速读标题: GitHub - L41KAA/CVE-2024-48705: Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifically found within the "set_sys_adm" function of the "adm.cgi" binary, and is due to improper santization of the user provided "newpass" field. -- 🔗来源链接
标签:
神龙速读暂无评论