vendor:
RB-1732
by:
k1nm3n.aotoi
7.5
CVSS
HIGH
Command Injection
78
CWE
Product Name: RB-1732
Affected Version From: RB-1732 V2.0.43
Affected Version To: RB-1732 V2.0.43
Patch Exists: N/A
Related CWE: N/A
CPE: h:sapido:rb-1732
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux
2019
SAPIDO RB-1732 command line execution
This exploit allows an attacker to execute arbitrary commands on the vulnerable SAPIDO RB-1732 router. The exploit sends a POST request to the router's /goform/formSysCmd page with the command to be executed in the sysCmd parameter. The response contains the output of the command in a textarea element.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in system commands.