Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21805 PoC — Advantech R-SeeNet 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Advantech R-SeeNet 操作系统命令注入漏洞 (CVE-2021-21805)
Description:Advantech R-SeeNet是中国台湾研华(Advantech)公司的一个工业监控软件。该软件基于 snmp 协议进行监控平台,并且适用于 Linux、Windows 平台。 Advantech R-SeeNet存在操作系统命令注入漏洞,该漏洞源于ping.php 的脚本功能。
Description
Advantech R-SeeNet 2.4.12 is susceptible to remote OS command execution via the ping.php script functionality. An attacker, via a specially crafted HTTP request, can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
File Snapshot

id: CVE-2021-21805 info: name: Advantech R-SeeNet 2.4.12 - OS Command Injection author: arafata ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.