Skip to content

V33RU/CommandInWiFi-Zeroclick

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

61 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CommandInWiFi

CommandInWiFi sticker

CommandInWiFi PoC

Investigating Command Injection Flaws in WiFi Access Point Storage
Inspired by Zero-Click Attacks


⚠️ Disclaimer

This project is under development.

  • Purpose: Strictly for educational and research purposes only. Use ethically and legally.
  • IoT Pentesting Use Case: Designed for IoT security professionals to evaluate device behavior under abnormal WiFi SSID input conditions.

📖 Description

This tool generates WiFi SSIDs based on user-defined payloads. Certain IoT devices and embedded systems mishandle SSID names by treating them as executable inputs or unsanitized strings during network discovery or storage. This leads to:

  • Denial of Service (DoS)
  • Remote Code Execution (RCE)
  • Unexpected device reboots
  • Unauthorized port access

The tool identifies if a device reboots or crashes when exposed to malicious SSIDs.

Example Use:
- Inject payload into SSID
- Monitor device behavior (e.g., unexpected reboot, shell access, crash)

✅ Device Behavior Classification

Status Description
SAFE Device ignores SSID payloads and behaves normally.
UNSAFE Device crashes or reboots upon seeing specific SSIDs.

🧪 Target Devices Prone to Zero-Click Injection

S.No Device Description Risk Level
1 Devices auto-connecting to open SSIDs with no user interaction Zero-Click
2 Devices interpreting saved SSIDs as shell input during boot or network scanning Critical
3 Devices with improper escaping of special characters in SSID Low

🔬 Proof of Concept (PoC)

SSID payload change

Expected Output - Device reboot or crash


📌 TODO List

  • Develop full testing framework
  • Auto-discover vulnerable IoT devices
  • Write project documentation
  • Add vulnerable firmware/source samples
  • Maintain a payload injection list
  • Build CLI-based SSID test tool
  • Expand test modules:
    • OS Command Injection payloads
    • Bluetooth vulnerability tests
    • NFC fuzzing (planned)

🔗 Referral Links

About

CommandInWiFi: Investigating Command Injection Flaws in WiFi Access Point Storage

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published