Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-34753 PoC — Schneider Electric SpaceLogic C-Bus Home Controller 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Schneider Electric SpaceLogic C-Bus Home Controller 操作系统命令注入漏洞 (CVE-2022-34753)
Description:Schneider Electric SpaceLogic C-Bus Home Controller是法国施耐德电气(Schneider Electric)公司的一个功能强大、完全集成的系统。可以控制和自动化照明和许多其他电气系统和产品。 Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) V1.31.460 及之前版本存在操作系统命令注入漏洞,该漏洞源于OS 命令中使用的特殊元素的不正确中和,攻击者利用该漏洞可以提升root权限
Description
SpaceLogic C-Bus Home Controller through 1.31.460 is susceptible to remote command execution via improper neutralization of special elements. Remote root exploit can be enabled when the command is compromised, and an attacker can potentially execute malware, obtain sensitive information, modify data, and/or gain full control without entering necessary credentials.
File Snapshot

id: CVE-2022-34753 info: name: SpaceLogic C-Bus Home Controller <=1.31.460 - Remote Command Execu ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.