Linksys AX3200 V1.1.00 - Command Injection

Author: Ahmed Alroky
type: webapps
platform: hardware
port: 
date_added: 2023-03-22  
date_updated: 2023-03-22  
verified: 0  
codes: CVE-2022-38841  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 51035.txt  
# Exploit Title: Linksys AX3200 V1.1.00 - Command Injection
# Date: 2022-09-19
# Exploit Author: Ahmed Alroky
# Author: Linksys
# Version: 1.1.00
# Authentication Required: YES
# CVE : CVE-2022-38841

# Tested on: Windows

# Proof Of Concept:

1 - login into AX3200 webui
2 - go to diagnostics page
3 - put "google.com|ls" to perform a traceroute
4 - you will get the file list and also you can try "example.com|id" to ensure that all commands executed as a root user