Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-1480 PoC — Cisco SD-WAN vManage Software 输入验证错误漏洞

Source
Associated Vulnerability
Title:Cisco SD-WAN vManage Software 输入验证错误漏洞 (CVE-2021-1480)
Description:Cisco SD-WAN vManage Software是美国思科(Cisco)公司的一款用于SD-WAN(软件定义广域网络)解决方案的管理软件。 Cisco SD-WAN vManage Software 存在输入验证错误漏洞,该漏洞允许未经身份验证的远程攻击者执行任意代码。
Description
PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.
Readme
# Exploit for CVE-2021-1480 (SD-WAN)

PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN. The full publicaiton is available on XMCO website : 

* https://blog.xmco.fr/wp-content/uploads/2021/08/XMCO-SDWAN_Report-CVE-2021-1480.pdf

Usage:
1. update Lines 173 and 176 to set the uid of the current user
2. Start the proxy: `python cve-2021-1480.py -L 4564 127.0.0.1 4565`
3. Start the confd_cli: `CONFD_IPC_PORT=4564 /usr/bin/confd_cli`
4. Commands on the confd_cli are now executed by `root`

Source: https://github.com/nccgroup/tcpprox/blob/master/prox.py
File Snapshot

[4.0K] /data/pocs/99b6059c06ca787403b48d4e56c7aa722fa78d32 ├── [ 11K] cve-2021-1480.py └── [ 563] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.