Skip to content

sinnet3000/alcatel_i240w_metasploit_command_exec_module

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Alcatel Lucent I-240W - Reverse TCP MIPS payload via HTTP remote execution

This is a Metasploit module I developed for being able to exploit a remote execution vulnerability in Alcatel I240W ONT. They are used by a big ISP in Mexico.

In depth information about the remote execution vulnerability is here: http://www.websec.mx/advisories/view/Ejecuci%C3%B3n-de-comandos-en-Alcatel-Lucent-I-240W-Q

A demo video is available here: https://www.youtube.com/watch?v=xHH2lhC34PY

License

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).

Copyright (C) 2018 Luis Colunga (@sinnet3000). All rights reserved.

See the LICENSE file for full details.

About

This is a Metasploit module I developed for being able to exploit a remote execution vulnerability in Alcatel I240W ONT. They are used by a big ISP in Mexico.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages