Skip to content

MosaedH/CVE-2022-32548-RCE-POC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2022-32548-RCE-POC

DrayTek unauthenticated remote code execution vulnerability (CVE-2022-32548) in /cgi-bin/wlogin.cgi via username field

Technical details

The web management interface of the vulnerable DrayTek devices is affected by a buffer overflow on the login page at /cgi-bin/wlogin.cgi. An attacker may supply carefully crafted username and/or password as base64 encoded strings inside the fields aa and ab of the login page

details:

full chained Unauthenticated RCE written in python with multi targets (list of ips) capability and threading (for faster checking huge list of ips), the script save the result in separate file (vulns.txt) for feature use. this upload comes with huge list of servers from shodan.

dorks:

shodan (src: Shodan)

Alt text

Vulnerable devices

The vulnerable devices are as follow:

  • Vigor3910 < 4.3.1.1
  • Vigor1000B < 4.3.1.1
  • Vigor2962 Series < 4.3.1.1
  • Vigor2927 Series < 4.4.0
  • Vigor2927 LTE Series < 4.4.0
  • Vigor2915 Series < 4.3.3.2
  • Vigor2952 / 2952P < 3.9.7.2
  • Vigor3220 Series < 3.9.7.2
  • Vigor2926 Series < 3.9.8.1
  • Vigor2926 LTE Series < 3.9.8.1
  • Vigor2862 Series < 3.9.8.1
  • Vigor2862 LTE Series < 3.9.8.1
  • Vigor2620 LTE Series < 3.9.8.1
  • VigorLTE 200n < 3.9.8.1
  • Vigor2133 Series < 3.9.6.4
  • Vigor2762 Series < 3.9.6.4
  • Vigor165 < 4.2.4
  • Vigor166 < 4.2.4
  • Vigor2135 Series < 4.4.2
  • Vigor2765 Series < 4.4.2
  • Vigor2766 Series < 4.4.2
  • Vigor2832 < 3.9.6
  • Vigor2865 Series < 4.4.0
  • Vigor2865 LTE Series < 4.4.0
  • Vigor2866 Series < 4.4.0
  • Vigor2866 LTE Series < 4.4.0

Hits

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages