H3C GR-1200W
This is a method to bypass the offical patch for CVE-2022-37070
Vulnerability introduction
H3C GR-1200W was discovered a fatal vulnerabilities that can cause a remote code execution(RCE) via the aspForm parame
Official website : https://www.h3c.com/
Download link: H3C MiniGRW1A0V100R008 版本软件及说明书-新华三集团-H3C
H3C MiniGRW1A0V100R008 is the latest version on GR-1200W
Vulnerability analysis
DelL2tpLNSList parameter in the function sub_46F0A8
In the binary file /bin/webs , we use IDA to locate the function sub_46F0A8 that causes the vulnerability.
As you can see, the snprintf function is called on line 36 of the sub_46F0A8 function. Let’s trace the source of the parameter
We found that the value of v14 and v15 is determined by parameter , we can bypass the check_function sub_46F3F0(CVE-2022-37070 offical patch) by using the character ‘0a’ like this
The image shows the router rebooting after the reboot command is executed
The POC is as follows:
1 | POST /goform/aspForm HTTP/1.1 |
Note that when copying this POC, there will be an additional 0d byte after ‘param=1;’, and all you need to do is delete this byte