.. / CVE-2021-36380

Exploit for Sunhillo SureLine <8.7.0.1.1 - Unauthenticated OS Command Injection (CVE-2021-36380)

Description:

Sunhillo SureLine <8.7.0.1.1 is vulnerable to OS command injection. The /cgi/networkDiag.cgi script directly incorporated user-controllable parameters within a shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. The following POST request injects a new command that instructs the server to establish a reverse TCP connection to another system, allowing the establishment of an interactive remote shell session.

Nuclei Template

View the template here CVE-2021-36380.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-36380.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2021-36380
https://www.sunhillo.com/product/sureline/
https://github.com/Ostorlab/KEV
https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/
https://github.com/fkie-cad/nvd-json-data-feeds