""ET EXPLOIT NETGEAR R7000/R6400 - Command Injection Outbound (CVE-2019-6277)""

SID: 2027882

Revision: 2

Class Type: attempted-admin

Metadata: affected_product Netgear_Router, attack_target IoT, created_at 2019_08_13, deployment Perimeter, malware_family Mirai, performance_impact Low, signature_severity Major, updated_at 2019_08_13, mitre_tactic_id TA0008, mitre_tactic_name Lateral_Movement, mitre_technique_id T1210, mitre_technique_name Exploitation_Of_Remote_Services

Reference:

  • cve

  • CVE-2016-6277

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: any

Destination Port: $HTTP_PORTS

Flow: to_server,established

Contents:

  • Value: "GET"

  • Value: "/cgi-bin/|3b|wget" Depth: 14

  • Value: !"|0d 0a|Referer|3a 20|"

Within:

PCRE: "/^\/cgi-bin\/\x3bwget[^\x0d]+\x7c|sh$/U"

Special Options:

  • http_method

  • http_uri

  • fast_pattern

  • http_header

source