# CVE-2023-43261 - PoC
### Critical Vulnerability Exposes Sensitive Information and Enables Unauthorized Access in Milesight Routers
- **Date:** 1 October 2023
- **Vendor of the product:** [Milesight](https://www.milesight.com/) (Formerly Xiamen Ursalink Technology Co., Ltd.)
- **Affected Products:** UR5X, UR32L, UR32, UR35, UR41 and there might be other Industrial Cellular Routers that could also be vulnerable.
- **Affected Firmware:** I've confirmed the patch for firmware v126.96.36.199. Earlier versions may be vulnerable, but vendor confirmation is needed. I have made the request, but I have not received a response yet.
- **Severity:** 7.3/10 - ![Alt text](https://img.shields.io/badge/-High-df3d03)
Run the script with the following command, replacing `<URL>` with your target URL.
foo@bar:~$ python3 CVE-2023-43261.py <URL>
Run the script with the following command to process a list of URLs in the file:
foo@bar:~$ python3 CVE-2023-43261.py -f list_urls.txt
## Google Dorks
- ```"/lang/log/system" ext:log```
- ```"URSALINK" "English" "Login"```
## Shodan Search Query
1. Security Advisory: https://vulners.com/cve/CVE-2023-43261
2. Writeup: https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf
**Script Author:** Bipin Jitiya ([@win3zz](https://twitter.com/win3zz))
The PoC script provided in this repository is intended for educational and research purposes only. It is designed to demonstrate the existence of a vulnerability and assist in understanding potential security risks.
**Usage of this script for any unauthorized activities, including but not limited to unauthorized access, unauthorized testing, or any other form of misuse, is strictly prohibited.**
The author and contributors of this repository assume no liability and are not responsible for any misuse or damages caused by the utilization of this script. By using this script, you agree to use it responsibly and at your own risk.
Always obtain proper authorization and permissions before conducting any security assessments or penetration testing activities. Ensure that you comply with all applicable laws, regulations, and ethical guidelines.