CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC
Find a file
2023-06-01 19:21:21 -03:00
README.md Update README.md 2023-06-01 19:21:21 -03:00

CVE-2023-33381-MitraStar-GPT-2741GNAC

CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC

Device: GPT-2741GNAC

Firmware Version: AR_g5.8_110WVN0b7_2

Vulnerability Description:

When logging in via SSH, it was apparent that one would be directed to a restricted shell instead of the expected full shell access. image

After exploring several known vulnerabilities, I decided to delve into the search for new ones. To begin, I logged into the administrative portal and began testing various functionalities that could potentially result in OS command injection. Within the Diagnostic menu, I came across a particular feature that allowed me to test connectivity using the ping and traceroute commands. image

image

So, I decided to try something sneaky by adding a ";" character to my command. I executed "cat /etc/passwd" and guess what? The command ran successfully.

image

So, I decided to try something sneaky by adding a ";" character to my command. I executed "cat /etc/passwd" and guess what? The command ran successfully.

image

As clearly illustrated in the image below, the modifications I made have enabled me to login and freely execute commands like "uname" and "cat"

image

Root of cause

image

image

image