Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-36267 PoC — Airspan AirSpot 5410 安全漏洞

Source
Associated Vulnerability
Title:Airspan AirSpot 5410 安全漏洞 (CVE-2022-36267)
Description:Airspan AirSpot 5410是美国Airspan公司的一款先进的 LTE、CAT12、户外、多服务产品。 Airspan AirSpot 5410 0.3.4.1-4及以前版本存在安全漏洞,该漏洞源于二进制组件/home/www/cgi-bin/diagnostics.cgi可以接收未经身份验证的请求和未经消毒的数据导致未经身份验证的攻击者编写恶意http请求进行远程命令注入来调用ping功能。
Description
PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.
Readme
# CVE-2022-36267 - Airspan AirSpot 5410 Unauthenticated Remote Command Injection.

## Overview
This repository contains a Proof of Concept (PoC) reverse shell script for exploiting CVE-2022-36267, a critical vulnerability in Airspan AirSpot 5410 devices. The script is a practical demonstration, complementing the in-depth analysis provided in the blog post "Airspan AirSpot 5410 - Vulnerability Report."

### Affected versions
All Airspan AirSpot 5410 devices from version 0.3.4.1-4 and under.

### PoC Script Usage

```python
# Usage: python AirSpot-5410.py --RHOST <Target-IP> --RPORT <Target-Port> --LHOST <Local-IP> --LPORT <Local-Port>
# Example: python AirSpot-5410.py --RHOST 192.168.1.1 --RPORT 443 --LHOST 192.168.1.100 --LPORT 4444
```

 ### Video Proof of Concept

![Script PoC CVE-2022-36267](https://neroteam.com/blog/pages/airspan-airspot-5410-vulnerability-report/airspan-1.jpg?m=1673082966)

[![Airspan AirSpot 5410 Unauthenticated Remote Command Injection](https://i.ibb.co/7gXHL9q/500px-youtube-social-play.png)](https://www.youtube.com/embed/kb1F6cxhCQg)

### Note
FOR EDUCATIONAL PURPOSE ONLY.
File Snapshot

[4.0K] /data/pocs/a1d3849aa906ef8a0d85fd0bb2ae38da74b1fbd4 ├── [3.2K] AirSpot-5410.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.