""ET EXPLOIT Linksys WRT54G Version 3.1 Command Injection Attempt""
SID: 2029734
Revision: 2
Class Type: attempted-admin
Metadata: created_at 2020_03_24, updated_at 2020_03_24, mitre_tactic_id TA0008, mitre_tactic_name Lateral_Movement, mitre_technique_id T1210, mitre_technique_name Exploitation_Of_Remote_Services
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "POST"
-
Value: "Authorization|3a 20|Basic|20|"
-
Value: "/apply.cgi" Depth: 10
-
Value: "change_action=gozila_cgi"
-
Value: "submit_type=language"
-
Value: "&ui_language="
Within:
PCRE: "/^[(?:\x60|%60)(?:\x27|%27)]/R"
Special Options:
-
http_method
-
http_header
-
http_uri
-
http_client_body
-
fast_pattern
-
http_client_body
-
http_client_body