Skip to content

Latest commit

 

History

History
23 lines (15 loc) · 1.09 KB

README.md

File metadata and controls

23 lines (15 loc) · 1.09 KB

CVE-2022-36267 - Airspan AirSpot 5410 Unauthenticated Remote Command Injection.

Overview

This repository contains a Proof of Concept (PoC) reverse shell script for exploiting CVE-2022-36267, a critical vulnerability in Airspan AirSpot 5410 devices. The script is a practical demonstration, complementing the in-depth analysis provided in the blog post "Airspan AirSpot 5410 - Vulnerability Report."

Affected versions

All Airspan AirSpot 5410 devices from version 0.3.4.1-4 and under.

PoC Script Usage

# Usage: python AirSpot-5410.py --RHOST <Target-IP> --RPORT <Target-Port> --LHOST <Local-IP> --LPORT <Local-Port>
# Example: python AirSpot-5410.py --RHOST 192.168.1.1 --RPORT 443 --LHOST 192.168.1.100 --LPORT 4444

Video Proof of Concept

Script PoC CVE-2022-36267

Airspan AirSpot 5410 Unauthenticated Remote Command Injection

Note

FOR EDUCATIONAL PURPOSE ONLY.