Files
CVEs-PoC/2021/CVE-2021-36706.md
2025-09-29 21:09:30 +02:00

18 lines
764 B
Markdown

### [CVE-2021-36706](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36706)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
In ProLink PRC2402M V1.0.18 and older, the set_sys_cmd function in the adm.cgi binary, accessible with a page parameter value of sysCMD contains a trivial command injection where the value of the command parameter is passed directly to system.
### POC
#### Reference
- https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#syscmd-command-injection
#### Github
No PoCs found on GitHub currently.