Skip to content

Latest commit

 

History

History
15 lines (8 loc) · 684 Bytes

File metadata and controls

15 lines (8 loc) · 684 Bytes

Alcatel Lucent I-240W - Reverse TCP MIPS payload via HTTP remote execution

This is a Metasploit module I developed for being able to exploit a remote execution vulnerability in Alcatel I240W ONT. They are used by a big ISP in Mexico.

In depth information about the remote execution vulnerability is here: http://www.websec.mx/advisories/view/Ejecuci%C3%B3n-de-comandos-en-Alcatel-Lucent-I-240W-Q

A demo video is available here: https://www.youtube.com/watch?v=xHH2lhC34PY

License

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).

Copyright (C) 2018 Luis Colunga (@sinnet3000). All rights reserved.

See the LICENSE file for full details.