vendor:
SLR-120 Router
by:
Aryan Chehreghani
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: SLR-120 Router
Affected Version From: All version
Affected Version To: All version
Patch Exists: YES
Related CWE: CVE-2020-17456
CPE: h:seowon_intech:slr-120
Tags: seowon,cve2020,oast,packetstorm,rce,router,unauth,iot,cve
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://maj0rmil4d.github.io/Seowon-SlC-130-And-SLR-120S-Exploit/, https://nvd.nist.gov/vuln/detail/CVE-2020-17456, http://packetstormsecurity.com/files/158933/Seowon-SlC-130-Router-Remote-Code-Execution.html, http://packetstormsecurity.com/files/166273/Seowon-SLR-120-Router-Remote-Code-Execution.html, https://www.exploit-db.com/exploits/50821
Nuclei Metadata: {'max-request': 2, 'vendor': 'seowonintech', 'product': 'slc-130_firmware'}
Platforms Tested: Windows 10 Enterprise x64, Linux
2022
Seowon SLR-120 Router – Remote Code Execution (Unauthenticated)
Execute commands without authentication as admin user, To use it in all versions, we only enter the router ip & Port(if available) in the script and Execute commands with root user.
Mitigation:
Ensure that authentication is required for all remote code execution requests.