Telesquare SDT-CW3B1 1.1.0 - OS Command InjectionTelesquare SDT-CW3B1 1.1.0 - OS Command Injection
CVE-2021-46422
Usage:
```bash
_______ ________ ___ ____ ___ ___ __ __ _____ __ __ ___ ___
/ ____/ | / / ____/ |__ \ / __ \__ \< / / // / / ___// // /|__ \|__ \
/ / | | / / __/________/ // / / /_/ // /_____/ // /_/ __ \/ // /___/ /__/ /
/ /___ | |/ / /__/_____/ __// /_/ / __// /_____/__ __/ /_/ /__ __/ __// __/
\____/ |___/_____/ /____/\____/____/_/ /_/ \____/ /_/ /____/____/
Telesquare SDT-CW3B1 1.1.0 - OS Command Injection [ Valentin Lobstein ]
usage: exp.py [-h] [-u URL] [-f FILE] [-c COMMAND]
options:
-h, --help show this help message and exit
-u URL, --url URL Target URL/IP
-f FILE, --file FILE Target file
-c COMMAND, --command COMMAND
Command
```
### Zoomeye CLI Dork:
```bash
zoomeye search 'title:"Login to SDT-CW3B1"' -num 1500 -filter=ip,port
```
### Shodan CLI Dork:
```bash
shodan search 'title:"Login to SDT-CW3B1"' --fields=ip_str,port --separator ":" --limit 1000 | grep '' | sed 's/.$//'
```
[4.0K] /data/pocs/35c20d5ddf103b90d777713f6ec3a366984a2438
├── [4.1K] exp.py
├── [ 447] parser_zoomeye.py
└── [1.2K] README.md
0 directories, 3 files