""ET EXPLOIT Netgear Seventh Inferno Vulnerability (post-auth shell injection)""
SID: 2033971
Revision: 2
Class Type: attempted-admin
Metadata: attack_target Networking_Equipment, created_at 2021_09_16, deployment Perimeter, signature_severity Major, updated_at 2021_09_16
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: [$HOME_NET,$HTTP_SERVERS]
Destination Port: $HTTP_PORTS
Flow:
Contents:
-
Value: "POST"
-
Value: "/set.cgi?cmd=diag_traceroute"
-
Value: "&hostname="
Within:
PCRE: "/&hostname=[^&\r\n]+(?:\x3b|\x0a|\x26|\x60|\x7C|\x24)/P"
Special Options:
-
http_method
-
http_uri
-
fast_pattern
-
http_client_body