mirror of
				https://github.com/HackTricks-wiki/hacktricks.git
				synced 2025-10-10 18:36:50 +00:00 
			
		
		
		
	Update command-injection.md
This commit is contained in:
		
							parent
							
								
									1ccf400176
								
							
						
					
					
						commit
						5b9ec7fcd6
					
				| @ -189,13 +189,6 @@ topicurl=<handler>¶m=-n | ||||
| topicurl=setEasyMeshAgentCfg&agentName=;id; | ||||
| ``` | ||||
| 
 | ||||
| Hardening and detection: | ||||
| 
 | ||||
| - Reject inputs that start with `-` and enforce strict allowlists and types (IP, MAC, SSID, etc.). | ||||
| - Always pass user data after a literal `--` where supported and never allow extra flags from user-controlled fields. | ||||
| - Prefer safe APIs (no shell); for wrappers, construct fixed argv templates with no user-controlled flags. | ||||
| - Look for unauthenticated hits to centralized CGI endpoints (e.g., `/cgi-bin/cstecgi.cgi`) with selector parameters and values beginning with `-`. | ||||
| 
 | ||||
| ## Brute-Force Detection List | ||||
| 
 | ||||
| 
 | ||||
| @ -213,4 +206,4 @@ https://github.com/carlospolop/Auto_Wordlists/blob/main/wordlists/command_inject | ||||
| - [HTB Nocturnal: IDOR → Command Injection → Root via ISPConfig (CVE‑2023‑46818)](https://0xdf.gitlab.io/2025/08/16/htb-nocturnal.html) | ||||
| - [Unit 42 – TOTOLINK X6000R: Three New Vulnerabilities Uncovered](https://unit42.paloaltonetworks.com/totolink-x6000r-vulnerabilities/) | ||||
| 
 | ||||
| {{#include ../banners/hacktricks-training.md}} | ||||
| {{#include ../banners/hacktricks-training.md}} | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user