.. / CVE-2020-12124

Exploit for WAVLINK WN530H4 live_api.cgi - Command Injection (CVE-2020-12124)

Description:

A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.

Nuclei Template

View the template here CVE-2020-12124.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-12124.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2020-12124
https://github.com/db44k/CVE-2020-12124
https://github.com/Scorpion-Security-Labs/CVE-2020-12124
https://www.wavlink.com/en_us/product/WL-WN530H4.html
https://cerne.xyz/bugs/CVE-2020-12124