Skip to content

Commit 2159574

Browse files
h00die-gr3ybwatters-r7
authored andcommitted
added default options and updated documentation
1 parent 15c2027 commit 2159574

File tree

2 files changed

+7
-1
lines changed

2 files changed

+7
-1
lines changed

documentation/modules/exploit/linux/http/raspberrymatic_unauth_rce_cve_2024_24578.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,3 +108,5 @@ meterpreter >
108108
## Limitations
109109
You have to wait maximum five minutes for a session to allow `cron` to run the malicious watchdog script
110110
containing the payload. Just be patient and wait for the magic to happen ;-)
111+
Another limitation is that the root filesystem on RaspberyMatic image is mounted read-only, so you need to set the
112+
option `FETCH_WRITABLE_DIR` to `/tmp` (this is mounted RW) otherwise the exploit will fail.

modules/exploits/linux/http/raspberrymatic_unauth_rce_cve_2024_24578.rb

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,11 @@ def initialize(info = {})
4949
{
5050
'Platform' => ['unix', 'linux'],
5151
'Arch' => [ARCH_CMD],
52-
'Type' => :unix_cmd
52+
'Type' => :unix_cmd,
53+
'DefaultOptions' => {
54+
'PAYLOAD' => 'cmd/linux/http/aarch64/meterpreter_reverse_tcp',
55+
'FETCH_WRITABLE_DIR' => '/tmp'
56+
}
5357
}
5458
]
5559
],

0 commit comments

Comments
 (0)