Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-31630

Description

Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application.

POC

Reference

- https://packetstormsecurity.com/files/162563/OpenPLC-WebServer-3-Remote-Code-Execution.html

- https://www.youtube.com/watch?v=l08DHB08Gow

Github

- https://github.com/0xNayel/WifineticTwo

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/FlojBoj/CVE-2021-31630

- https://github.com/Hunt3r0x/CVE-2021-31630-HTB

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/UserB1ank/CVE-2021-31630

- https://github.com/adibabdala123/cve-2021-31630

- https://github.com/adibna/cve-2021-31630

- https://github.com/behindsecurity/htb-wifinetictwo-exploit

- https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE

- https://github.com/hev0x/CVE-2021-31630-OpenPLC_RCE

- https://github.com/junnythemarksman/CVE-2021-31630

- https://github.com/machevalia/OpenPLC-CVE-2021-31630-RCE

- https://github.com/manuelsantosiglesias/CVE-2021-31630

- https://github.com/mind2hex/CVE-2021-31630

- https://github.com/mind2hex/CVE-2021-31630-OpenPLC-3-Authenticated-RCE

- https://github.com/mind2hex/gitbook_public

- https://github.com/n0-traces/cve_monitor

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/sealldeveloper/CVE-2021-31630-PoC

- https://github.com/thewhiteh4t/cve-2021-31630

- https://github.com/ttps-byte/cve-2021-31630