Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-45852 PoC — Viessmann Vitogate 命令注入漏洞

Source
Associated Vulnerability
Title:Viessmann Vitogate 命令注入漏洞 (CVE-2023-45852)
Description:Viessmann Vitogate是Viessmann公司的一个智能化控制系统。 Viessmann Vitogate 300 2.1.3.0版本存在安全漏洞,该漏洞源于允许未经身份验证的攻击者绕过身份验证,并通过put方法的ipaddr参数执行任意命令。
Description
In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.
File Snapshot

id: CVE-2023-45852 info: name: Viessmann Vitogate 300 - Remote Code Execution author: iamnoooob ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.