### [CVE-2021-31630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31630) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application. ### POC #### Reference - https://packetstormsecurity.com/files/162563/OpenPLC-WebServer-3-Remote-Code-Execution.html - https://www.youtube.com/watch?v=l08DHB08Gow #### Github - https://github.com/0xNayel/WifineticTwo - https://github.com/ARPSyndicate/cve-scores - https://github.com/FlojBoj/CVE-2021-31630 - https://github.com/Hunt3r0x/CVE-2021-31630-HTB - https://github.com/PuddinCat/GithubRepoSpider - https://github.com/UserB1ank/CVE-2021-31630 - https://github.com/adibabdala123/cve-2021-31630 - https://github.com/adibna/cve-2021-31630 - https://github.com/behindsecurity/htb-wifinetictwo-exploit - https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE - https://github.com/hev0x/CVE-2021-31630-OpenPLC_RCE - https://github.com/junnythemarksman/CVE-2021-31630 - https://github.com/machevalia/OpenPLC-CVE-2021-31630-RCE - https://github.com/manuelsantosiglesias/CVE-2021-31630 - https://github.com/mind2hex/CVE-2021-31630 - https://github.com/mind2hex/CVE-2021-31630-OpenPLC-3-Authenticated-RCE - https://github.com/mind2hex/gitbook_public - https://github.com/n0-traces/cve_monitor - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/plzheheplztrying/cve_monitor - https://github.com/sealldeveloper/CVE-2021-31630-PoC - https://github.com/thewhiteh4t/cve-2021-31630 - https://github.com/ttps-byte/cve-2021-31630