.. / CVE-2022-31126

Exploit for Roxy-WI <6.1.1.0 - Remote Code Execution (CVE-2022-31126)

Description:

Roxy-WI before 6.1.1.0 is susceptible to remote code execution. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file.

Nuclei Template

View the template here CVE-2022-31126.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-31126.yaml
Copy

References:

https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-mh86-878h-43c9
https://nvd.nist.gov/vuln/detail/CVE-2022-31137
https://www.cve.org/CVERecord?id=CVE-2022-31137
http://packetstormsecurity.com/files/167805/Roxy-WI-Remote-Command-Execution.html
https://nvd.nist.gov/vuln/detail/CVE-2022-31126