alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Possible Linksys E1500/E2500 apply.cgi RCE Attempt"; flow:established,to_server; content:"POST"; http_method; content:"/apply.cgi"; http_uri; depth:10; content:"submit_button="; http_client_body; depth:14; content:"&submit_type=start_ping"; http_client_body; distance:0; fast_pattern; content:"&ping_size="; http_client_body; distance:0; content:"|3b|"; http_client_body; distance:0; within:30; metadata: former_category EXPLOIT; reference:url,www.exploit-db.com/exploits/24936; classtype:attempted-user; sid:2027099; rev:1; metadata:attack_target IoT?, deployment Perimeter, signature_severity Major, created_at 2019_03_19, performance_impact Low, updated_at 2019_03_19;)

Added 2019-03-19 18:45:08 UTC



This topic: Main > 2027099
Topic revision: r1 - 2019-03-19 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats