三星路由器WLAN AP WEA453e 未授权RCE等多个漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

# Exploiting Samsung Router WLAN AP WEA453e by [Omri Inbar](https://iryl.info/author/omri/ "Posts by Omri Inbar") | Nov 27, 2020 |) ![exploiting_samsung_router](https://images.seebug.org/1608186783236-w331s) Post Views: 699 ### In August 2020, I discovered multiple vulnerabilities in Samsung WLAN AP WEA453e, including a pre-auth root RCE, **** which means an attacker could run code remotely with root privilege's without logging in. ## **Vulnerability#1: XSS** The first vulnerability I found is an interesting reflected parameter in the form of an error message when navigating to a nonexistent path: ![Exploiting_Samsung_Router_1](https://images.seebug.org/1608186796868-w331s) I tried the most standard XSS payload: ``` <script>alert(1)</script> ``` Sure enough an alert popped: ![Exploiting_Samsung_Router_2](https://images.seebug.org/1608186807302-w331s) ## **Vulnerability#2: Local File Inclusion (LFI)** Because the previous error message showed the absolute path "/tmp/www/" I figured...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息