Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-46422 PoC — Telesquare SDT-CW3B1 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Telesquare SDT-CW3B1 操作系统命令注入漏洞 (CVE-2021-46422)
Description:Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
Description
CVE-2021-46422
Readme
## CVE-2021-46422

## 安装

```
下载py,使用cmd打开
```

## 使用

poc

```
python3 CVE-2021-46422.py -u url
```

exp

```
python3 tpexp.py -u http://www.xxx.com -c id
```

## 免责声明🧐

本工具仅面向合法授权的企业安全建设行为,如您需要测试本工具的可用性,请自行搭建测试环境。

在使用本工具进行检测时,您应确保该行为符合当地的法律法规,并且已经取得了足够的授权。请勿对非授权目标进行扫描。

如您在使用本工具的过程中存在任何非法行为,您需自行承担相应后果,我们将不承担任何法律及连带责任。
File Snapshot

[4.0K] /data/pocs/6685b4bbc9b7b138cd0398474c7971151736a053 ├── [3.4K] CVE-2021-46422.py └── [ 648] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →