Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-36553 PoC — Hytec Inter HWL-2511-SS 命令注入漏洞

Source
Associated Vulnerability
Title:Hytec Inter HWL-2511-SS 命令注入漏洞 (CVE-2022-36553)
Description:Hytec Inter HWL-2511-SS是日本Hytec Inter公司的一种工业 LTE 路由器和 Wi-Fi 接入点。 Hytec Inter HWL-2511-SS v1.05及之前存在安全漏洞,该漏洞源于组件/www/cgi-bin/popen.cgi 包含一个命令注入。
Description
PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.
Readme
# CVE-2022-36553 -  Hytec Inter HWL-2511-SS Unauthenticated Remote Command Injection.

## Overview
This repository contains a Proof of Concept (PoC) reverse shell script for exploiting CVE-2022-36553, a critical vulnerability in Hytec Inter HWL-2511-SS devices. The script is a practical demonstration, complementing the in-depth analysis provided in my blog post "Hytec Inter HWL-2511-SS - Vulnerability Report."

### Affected versions
All Hytec Inter HWL-2511-SS devices from version 1.05 and under.

### PoC Script Usage

```python
# Usage: python HWL-2511-SS.py --RHOST <Target-IP> --RPORT <Target-Port> --LHOST <Local-IP> --LPORT <Local-Port>
# Example: python HWL-2511-SS.py --RHOST 192.168.1.1 --RPORT 443 --LHOST 192.168.1.100 --LPORT 4444
```

 ### Video Proof of Concept

![Script PoC CVE-2022-26134](https://neroteam.com/blog/pages/hytec-inter-hwl-2511-ss-vulnerability-report/hytec-1.jpg?m=1673083022)

[![Hytec Inter HWL-2511-SS Unauthenticated Remote Command Injection](https://i.ibb.co/7gXHL9q/500px-youtube-social-play.png)](https://youtu.be/ILBJglgD-9U)

### Note
FOR EDUCATIONAL PURPOSE ONLY.
File Snapshot

[4.0K] /data/pocs/9c8f30d06ffa580e9ef7a575b01c2c548cd6e2ab ├── [5.9K] HWL-2511-SS.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.