Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19356 PoC — Netis WF2419 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Netis WF2419 操作系统命令注入漏洞 (CVE-2019-19356)
Description:Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.
Description
Netis router RCE exploit ( CVE-2019-19356)
Readme
# NETIS router (WF2419) RCE (CVE-2019-19356)

# Context

The vulnerability is an authenticated Remote Code Execution (RCE) as root through the NETIS (WF2419) router Web management page.

The vulnerability has been found on firmware version V1.2.31805 and on the last available firmware version V2.2.36123. Other models and firmware may also be vulnerable.

# Prerequisites

In order to exploit the vulnerability, a few prerequisites are required. Indeed, we need to reach the router Web management page. Moreover, if an authentication is enforced, we would need to authenticate by trying weak/default password, by performing Man-In-The-Middle attacks, or using any other mean.

# Vulnerability details

Once authenticated, we can notice the "System Tools" menu, which has a "Diagnostic Tools" link. The "Diagnostic Tools" allows performing UNIX "ping" and "tracert" system commands. The IP Address or the Domain Name could be specified in the form. The operating system would then run the chosen command on the specified IP Address and display the command output on the web page.

On the "ping" command, a filter in place prevents performing executing other commands than the “ping” command. It was not possible to bypass that filter.
However, in the "tracert" command, it was possible to perform OS command execution by using the “|” operator.

# Exploit
`python netis_rce.py http://192.168.1.1 "ls"`
File Snapshot

[4.0K] /data/pocs/69d2533cbfab9fec65868681014796856e0bcdef ├── [2.2K] CVE-2019-19356_exploit.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →