Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29972 PoC — Zyxel NAS326和Zyxel NAS542 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Zyxel NAS326和Zyxel NAS542 操作系统命令注入漏洞 (CVE-2024-29972)
Description:Zyxel NAS542和Zyxel NAS326都是中国合勤(Zyxel)公司的产品。Zyxel NAS542是一款NAS(网络附加存储)设备。Zyxel NAS326是一款云存储 NAS。 Zyxel NAS326 5.21(AAZF.17)C0之前版本、NAS542 V5.21(ABAG.14)C0之前版本存在操作系统命令注入漏洞。攻击者可通过HTTP POST请求来执行某些操作系统(OS)命令。
Readme
# TG Join Us https://t.me/WanLiChangChengWanLiChang
加入我们定时查收各类漏洞 EXP POC

# CVE-2024-29972-EXP
CVE-2024-29972 Zyxel Nas Backdoor Account 后门账户未授权开启

# FOFA
app="ZyXEL-NAS326"

# 注意事项 
该EXP利用脚本 系CVE-2024-29972与29973的结合利用 你也可以称为组合拳
后门账户 NsaRescueAngel 拥有Root 权限
File Snapshot

[4.0K] /data/pocs/2c4b3a38d08fc8fe224facda69385a4f8da03eb7 ├── [2.6K] CVE-2024-29972.py └── [ 367] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.