Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19356 PoC — Netis WF2419 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Netis WF2419 操作系统命令注入漏洞 (CVE-2019-19356)
Description:Netis WF2780是中国Netis公司的一个网络设备。提供AC路由器以千兆速度提供下一代Wi-Fi。 Netis WF2780 存在操作系统命令注入漏洞。该漏洞源于外部输入数据构造操作系统可执行命令过程中,网络系统或产品未正确过滤其中的特殊字符、命令等。攻击者可利用该漏洞执行非法操作系统命令。
Description
Netis router RCE exploit ( CVE-2019-19356)
Readme
# NETIS router (WF2419) RCE (CVE-2019-19356)

# Context

The vulnerability is an authenticated Remote Code Execution (RCE) as root through the NETIS (WF2419) router Web management page.

The vulnerability has been found on firmware version V1.2.31805 and on the last available firmware version V2.2.36123. Other models and firmware may also be vulnerable.

# Prerequisites

In order to exploit the vulnerability, a few prerequisites are required. Indeed, we need to reach the router Web management page. Moreover, if an authentication is enforced, we would need to authenticate by trying weak/default password, by performing Man-In-The-Middle attacks, or using any other mean.

# Vulnerability details

Once authenticated, we can notice the "System Tools" menu, which has a "Diagnostic Tools" link. The "Diagnostic Tools" allows performing UNIX "ping" and "tracert" system commands. The IP Address or the Domain Name could be specified in the form. The operating system would then run the chosen command on the specified IP Address and display the command output on the web page.

On the "ping" command, a filter in place prevents performing executing other commands than the “ping” command. It was not possible to bypass that filter.
However, in the "tracert" command, it was possible to perform OS command execution by using the “|” operator.

# Exploit
`python netis_rce.py http://192.168.1.1 "ls"`
File Snapshot

[4.0K] /data/pocs/69d2533cbfab9fec65868681014796856e0bcdef ├── [2.2K] CVE-2019-19356_exploit.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.