Share
## https://sploitus.com/exploit?id=E5BF5ED7-17D9-5834-BCBB-4C7AB9BF675B
Telesquare SDT-CW3B1 1.1.0 - OS Command Injection
CVE-2021-46422
Usage:
```bash
_______ ________ ___ ____ ___ ___ __ __ _____ __ __ ___ ___
/ ____/ | / / ____/ |__ \ / __ \__ \< / / // / / ___// // /|__ \|__ \
/ / | | / / __/________/ // / / /_/ // /_____/ // /_/ __ \/ // /___/ /__/ /
/ /___ | |/ / /__/_____/ __// /_/ / __// /_____/__ __/ /_/ /__ __/ __// __/
\____/ |___/_____/ /____/\____/____/_/ /_/ \____/ /_/ /____/____/
Telesquare SDT-CW3B1 1.1.0 - OS Command Injection [ Valentin Lobstein ]
usage: exp.py [-h] [-u URL] [-f FILE] [-c COMMAND]
options:
-h, --help show this help message and exit
-u URL, --url URL Target URL/IP
-f FILE, --file FILE Target file
-c COMMAND, --command COMMAND
Command
```
### Zoomeye CLI Dork:
```bash
zoomeye search 'title:"Login to SDT-CW3B1"' -num 1500 -filter=ip,port
```
### Shodan CLI Dork:
```bash
shodan search 'title:"Login to SDT-CW3B1"' --fields=ip_str,port --separator ":" --limit 1000 | grep '' | sed 's/.$//'
```