.. / CVE-2023-45852

Exploit for Viessmann Vitogate 300 - Remote Code Execution (CVE-2023-45852)

Description:

In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.

Nuclei Template

View the template here CVE-2023-45852.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-45852.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2023-45852
https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md
https://connectivity.viessmann.com/gb/mp-fp/vitogate/vitogate-300-bn-mb.html
https://github.com/tanjiti/sec_profile
https://github.com/komodoooo/Some-things