Skip to content

Commit f263932

Browse files
committed
automatic module_metadata_base.json update
1 parent 24fa34e commit f263932

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed

db/modules_metadata_base.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77459,6 +77459,68 @@
7745977459
"session_types": false,
7746077460
"needs_cleanup": null
7746177461
},
77462+
"exploit_linux/http/netis_unauth_rce_cve_2024_22729": {
77463+
"name": "Netis router MW5360 unauthenticated RCE.",
77464+
"fullname": "exploit/linux/http/netis_unauth_rce_cve_2024_22729",
77465+
"aliases": [
77466+
77467+
],
77468+
"rank": 600,
77469+
"disclosure_date": "2024-01-11",
77470+
"type": "exploit",
77471+
"author": [
77472+
"h00die-gr3y <[email protected]>",
77473+
"Adhikara13"
77474+
],
77475+
"description": "Netis router MW5360 has a command injection vulnerability via the password parameter on the login page.\n The vulnerability stems from improper handling of the \"password\" parameter within the router's web interface.\n The router's login page authorization can be bypassed by simply deleting the authorization header,\n leading to the vulnerability. All router firmware versions up to `V1.0.1.3442` are vulnerable.\n Attackers can inject a command in the 'password' parameter, encoded in base64, to exploit the command injection\n vulnerability. When exploited, this can lead to unauthorized command execution, potentially allowing the attacker\n to take control of the router.",
77476+
"references": [
77477+
"CVE-2024-22729",
77478+
"URL-https://attackerkb.com/topics/MvCphsf4LN/cve-2024-22729",
77479+
"URL-https://github.com/adhikara13/CVE/blob/main/netis_MW5360/blind%20command%20injection%20in%20password%20parameter%20in%20initial%20settings.md"
77480+
],
77481+
"platform": "Linux",
77482+
"arch": "mipsle",
77483+
"rport": 80,
77484+
"autofilter_ports": [
77485+
80,
77486+
8080,
77487+
443,
77488+
8000,
77489+
8888,
77490+
8880,
77491+
8008,
77492+
3000,
77493+
8443
77494+
],
77495+
"autofilter_services": [
77496+
"http",
77497+
"https"
77498+
],
77499+
"targets": [
77500+
"Linux Dropper"
77501+
],
77502+
"mod_time": "2024-06-12 18:57:29 +0000",
77503+
"path": "/modules/exploits/linux/http/netis_unauth_rce_cve_2024_22729.rb",
77504+
"is_install_path": true,
77505+
"ref_name": "linux/http/netis_unauth_rce_cve_2024_22729",
77506+
"check": true,
77507+
"post_auth": false,
77508+
"default_credential": false,
77509+
"notes": {
77510+
"Stability": [
77511+
"crash-safe"
77512+
],
77513+
"Reliability": [
77514+
"repeatable-session"
77515+
],
77516+
"SideEffects": [
77517+
"ioc-in-logs",
77518+
"artifacts-on-disk"
77519+
]
77520+
},
77521+
"session_types": false,
77522+
"needs_cleanup": true
77523+
},
7746277524
"exploit_linux/http/netsweeper_webadmin_unixlogin": {
7746377525
"name": "Netsweeper WebAdmin unixlogin.php Python Code Injection",
7746477526
"fullname": "exploit/linux/http/netsweeper_webadmin_unixlogin",

0 commit comments

Comments
 (0)