vendor:
SDT-CW3B1
by:
Ahmed Alroky
9.8
CVSS
CRITICAL
OS command injection
78
CWE
Product Name: SDT-CW3B1
Affected Version From: 1.0.0
Affected Version To: 1.1.2000
Patch Exists: YES
Related CWE: CVE-2021-46422
CPE: a:telesquare:sdt-cw3b1:1.1.0
Tags: packetstorm,cve,cve2021,telesquare,rce,router,injection,edb
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.exploit-db.com/exploits/50936, https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?, https://nvd.nist.gov/vuln/detail/CVE-2021-46422, https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing, http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'html:"SDT-CW3B1"', 'verified': True, 'vendor': 'telesquare', 'product': 'sdt-cs3b1_firmware'}
Platforms Tested: Windows
2022
SDT-CW3B1 1.1.0 – OS command injection
This exploit allows an attacker to execute arbitrary operating system commands on the target system. By sending a specially crafted HTTP request to the vulnerable CGI script, the attacker can inject malicious commands into the command parameter, which will be executed by the server. This can lead to unauthorized access, data leakage, and potential remote code execution.
Mitigation:
To mitigate this vulnerability, it is recommended to apply the latest security patches or updates provided by the vendor. Additionally, input validation and sanitization should be implemented in the vulnerable CGI script to prevent command injection attacks.