vendor:
SLC_130G
by:
maj0rmil4d
8.8
CVSS
HIGH
Remote Code Execution
N/A
CWE
Product Name: SLC_130G
Affected Version From: 1.0.11
Affected Version To: Possibly all versions
Patch Exists: YES
Related CWE: N/A
CPE: h:seowonintech:slc_130g
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2020
Seowon 130-SLC router 1.0.11 – ‘ipAddr’ RCE (Authenticated)
The default user/pass is admin/admin and the vulnerability is on the ipAddr parameter in system_log.cgi. To exploit the vulnerability, the attacker needs to login to the dashboard, setup a listener, download the revshell.txt with the RCE, and run the revshell.txt. To get a reverse shell, the attacker needs to setup the listener and download the file on the router then run it. To download, the attacker needs to send a POST request with the CommandDiagnostic, traceModetrace, reportIpOnly0, pingPktSize56, pingTimeout30, pingCount4, ipAddr;id, maxTTLCnt30, queriesCnt3, reportIpOnlyCheckboxon, btnApplyDownload, and T1596644096617 parameters.
Mitigation:
Ensure that the router is running the latest version of the firmware and that all users have strong passwords.