Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-0861 PoC — NetModule NSRW 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:NetModule NSRW 操作系统命令注入漏洞 (CVE-2023-0861)
Description:NetModule NSRW是NetModule公司的一系列路由器软件。 NetModule NSRW存在安全漏洞,该漏洞源于执行由未经过滤的用户输入构建的操作系统命令,经过身份验证的攻击者利用该漏洞可以执行任意命令。
Description
Analyzing and Reproducing the Command Injection Vulnerability (CVE-2023-0861) in NetModule Routers
Readme
### Analyzing and Reproducing the Command Injection Vulnerability (CVE-2023-0861) in NetModule Routers

NetModule is an Original Equipment Manufacturer (OEM) of industrial grade routers that are commonly used in critical
infrastructure and industrial control systems. On February 24th, 2023, ONEKEY, a security research firm, released a security
advisory disclosing a vulnerability that affect 9 NetModule routers. The vulnerability were identified within the web
management interface and allow authenticated users to execute arbitrary commands with elevated privileges.
As an individual interested in IoT security and firmware analysis, I find it valuable to review the entire reproduction process of
reported vulnerabilities and In the pursuit of expanding my knowledge and skills, I took it upon myself to reproduce the
disclosed vulnerability.
File Snapshot

[4.0K] /data/pocs/e026ab344347e1fe78c2ef1fea4e3a0373ea483c ├── [222K] Analyzing and Reproducing the Command Injection Vulnerability (CVE-2023-0861) in NetModule Routers.pdf ├── [1.1K] PoC-CVE-2023-0861.py └── [ 848] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.