CVE-2023-26802 Scanner
CVE-2023-26802 Scanner - Remote Command Injection vulnerability in DCBI-Netlog-LAB v1.0
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 week 21 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
DCBI-Netlog-LAB is a network management firmware solution developed by Digital China Networks (DCN) that includes administrative capabilities such as DHCP, routing, and NAT configuration. It is often deployed in enterprise network environments to manage traffic flow and device configurations.
This scanner identifies a critical remote command injection vulnerability (CVE-2023-26802) in DCBI-Netlog-LAB v1.0. The flaw exists in the CGI endpoint `/cgi-bin/network_config/nsg_masq.cgi`, where improper sanitization of user-supplied input enables attackers to inject system-level commands. Notably, this vulnerability can be exploited **without authentication**, which significantly increases its exploitability and impact.
The attack is carried out by sending a GET request to the vulnerable endpoint with maliciously crafted query parameters. Specifically, the `proto` parameter can be injected with shell commands, such as `;ls>filename`, allowing execution on the target system. A follow-up request to retrieve the generated file allows attackers to confirm successful execution. Since the server outputs the result of the injected command, the vulnerability can be reliably verified.
The successful exploitation of this issue allows attackers to gain unauthorized access to system-level operations. This can result in data exfiltration, backdoor installation, lateral movement within the network, and full system compromise. Given the unauthenticated nature of the exploit and its triviality, immediate remediation is essential.
REFERENCES