Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-12124 PoC — WAVLINK wavlink 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:WAVLINK wavlink 操作系统命令注入漏洞 (CVE-2020-12124)
Description:WAVLINK wavlink是中国睿因科技(WAVLINK)公司的一款路由器。连接两个或多个网络的硬件设备,在网络间起网关的作用。 WAVLINK存在操作系统命令注入漏洞。该漏洞源于外部输入数据构造操作系统可执行命令过程中,网络系统或产品未正确过滤其中的特殊字符、命令等。攻击者可利用该漏洞执行非法操作系统命令。以下产品及版本受到影响: WN530H4 M30H4.V5030.190403版本。
Description
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
File Snapshot

id: CVE-2020-12124 info: name: WAVLINK WN530H4 live_api.cgi - Command Injection author: Dhiyane ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.