vendor:
SDT-CW3B1
by:
Bryan Leong
9.8
CVSS
CRITICAL
OS Command Injection
78
CWE
Product Name: SDT-CW3B1
Affected Version From: 1.1.2000
Affected Version To: 1.1.2000
Patch Exists: YES
Related CWE: CVE-2021-46422
CPE: a:telesquare:sdt-cw3b1:1.1.0
Tags: packetstorm,cve,cve2021,telesquare,rce,router,injection,edb
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.exploit-db.com/exploits/50936, https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?, https://nvd.nist.gov/vuln/detail/CVE-2021-46422, https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing, http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'html:"SDT-CW3B1"', 'verified': True, 'vendor': 'telesquare', 'product': 'sdt-cs3b1_firmware'}
Platforms Tested:
2022
Telesquare SDT-CW3B1 1.1.0 – OS Command Injection
Telesquare SDT-CW3B1 1.1.0 is vulnerable to OS Command Injection. An attacker can exploit this vulnerability by sending malicious commands to the vulnerable CGI script. This can be done by sending a GET request to the vulnerable CGI script with the malicious command as a parameter. The attacker can then parse the XML response to get the output of the command.
Mitigation:
The best way to mitigate OS Command Injection is to use parameterized queries and input validation. This will ensure that the user input is sanitized and only valid input is accepted.