Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2022-31161 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Roxy-WI < 6.1.1.0 suffers from **Command Injection**. πŸ“‰ **Consequences**: Attackers can execute arbitrary OS commands remotely via the `subprocess_execute` function. This leads to full server compromise.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-77** (Command Injection). The flaw lies in the `/app/options.py` file.…

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **Roxy-WI** versions **before 6.1.1.0**. πŸ“¦ **Vendor**: hap-wi. 🌐 **Component**: The web interface used to manage Haproxy, Nginx, and Keepalived servers.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Capabilities**: Hackers gain **Remote Code Execution (RCE)**. πŸ“‚ **Impact**: They can read/write sensitive data, modify configurations, and potentially pivot to other internal systems.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. 🚫 **Auth**: No authentication required (`PR:N`). πŸ–±οΈ **UI**: No user interaction needed (`UI:N`). 🌍 **Vector**: Network-based (`AV:N`). This is a critical, easy-to-exploit vulnerability.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Exploit Status**: **YES**. Public PoC exists via Nuclei templates. πŸ“œ **Reference**: `CVE-2022-31161.yaml` on ProjectDiscovery GitHub. Wild exploitation is highly likely given the low barrier to entry.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for Roxy-WI instances. πŸ§ͺ **Test**: Send crafted requests to the `/app/options.py` endpoint targeting the `delcert` parameter.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: **YES**. Official patch released in **v6.1.1.0**. πŸ“₯ **Action**: Upgrade Roxy-WI immediately to version 6.1.1.0 or later. Check the GitHub release notes for details.

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch?**: If upgrading isn't possible, **block external access** to the Roxy-WI web interface. 🚧 **Mitigate**: Implement strict WAF rules to filter command injection patterns in the `delcert` parameter.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **IMMEDIATE ACTION REQUIRED**. CVSS Score indicates High Impact. With no auth required, automated bots are likely scanning for this. Patch now to prevent compromise.