Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-20123 PoC — Draytek VigorConnect 路径遍历漏洞

Source
Associated Vulnerability
Title:Draytek VigorConnect 路径遍历漏洞 (CVE-2021-20123)
Description:Draytek VigorConnect是中国居易科技(Draytek)公司的一种易于使用、重量轻、用于 DrayTek 产品的单站点中央管理系统。 Draytek VigorConnect 中存在路径遍历漏洞,该漏洞源于产品的DownloadFileServlet的文件下载功能存在安全问题。攻击者可通过该漏洞下载操作系统中具有root权限的的文件。以下产品及版本受到影响:Draytek VigorConnect 1.6.0-B3。
Description
Draytek VigorConnect 1.6.0-B3 is susceptible to local file inclusion in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.
File Snapshot

id: CVE-2021-20123 info: name: Draytek VigorConnect 1.6.0-B - Local File Inclusion author: 0x_A ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.