Share
## https://sploitus.com/exploit?id=0C78A8E1-6F7B-50CE-AE03-3D51FA8955DC
Telesquare SDT-CW3B1 1.1.0 - OS Command Injection

CVE-2021-46422

Usage: 


```bash

   _______    ________    ___   ____ ___  ___      __ __  _____ __ __ ___  ___      
  / ____/ |  / / ____/   |__ \ / __ \__ \<  /     / // / / ___// // /|__ \|__ \     
 / /    | | / / __/________/ // / / /_/ // /_____/ // /_/ __ \/ // /___/ /__/ /     
/ /___  | |/ / /__/_____/ __// /_/ / __// /_____/__  __/ /_/ /__  __/ __// __/      
\____/  |___/_____/    /____/\____/____/_/        /_/  \____/  /_/ /____/____/      
                                                                                    

Telesquare SDT-CW3B1 1.1.0 - OS Command Injection [ Valentin Lobstein ]

usage: exp.py [-h] [-u URL] [-f FILE] [-c COMMAND]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Target URL/IP
  -f FILE, --file FILE  Target file
  -c COMMAND, --command COMMAND
                        Command
  ```
   
  
 

### Zoomeye CLI Dork:

```bash

zoomeye search 'title:"Login to SDT-CW3B1"'  -num 1500  -filter=ip,port 

```

### Shodan CLI Dork:

```bash

shodan search 'title:"Login to SDT-CW3B1"' --fields=ip_str,port --separator ":" --limit 1000 | grep '' | sed 's/.$//'

```