Skip to content

Commit 9cfaa2e

Browse files
committed
Lowered rank and explained mock testing
1 parent 12b1936 commit 9cfaa2e

File tree

2 files changed

+25
-5
lines changed

2 files changed

+25
-5
lines changed

documentation/modules/exploit/linux/http/zyxel_parse_config_rce.md

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ Two caveats of this exploit chain were described by Jacob Baines in the followin
2121

2222
### Setup
2323

24-
This module was tested against USG Flex Version (???). To test this module you will need to acquire a hardware device
25-
running one of the vulnerable firmware versions listed above.
24+
To test this module you will need to acquire a hardware device running one of the vulnerable firmware versions listed above.
2625

2726
## Options
2827

@@ -41,5 +40,21 @@ The default value is `/tmp`
4140
1. Receive a Meterpreter session as the `root` user.
4241

4342
## Scenarios
44-
### USG Flex Version (???)
45-
43+
### Mock USG Flex environment
44+
```
45+
msf6 exploit(linux/http/zyxel_parse_config_rce) > set payload cmd/unix/generic
46+
payload => cmd/unix/generic
47+
msf6 exploit(linux/http/zyxel_parse_config_rce) > set cmd id
48+
cmd => id
49+
msf6 exploit(linux/http/zyxel_parse_config_rce) > set AllowNoCleanup true
50+
AllowNoCleanup => true
51+
msf6 exploit(linux/http/zyxel_parse_config_rce) > run
52+
53+
[*] Attempting to upload the payload via QSR file write...
54+
[+] File write was successful.
55+
[+] Command output:
56+
uid=0(root) gid=0(root) groups=0(root)
57+
58+
[!] This exploit may require manual cleanup of '/tmp/N.qsr' on the target
59+
[*] Exploit completed, but no session was created.
60+
```

modules/exploits/linux/http/zyxel_parse_config_rce.rb

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@
44
##
55

66
class MetasploitModule < Msf::Exploit::Remote
7-
Rank = ExcellentRanking
7+
8+
Rank = NormalRanking
89

910
include Msf::Exploit::Remote::HttpClient
1011
include Msf::Exploit::FileDropper
@@ -18,6 +19,10 @@ def initialize(info = {})
1819
'Description' => %q{
1920
This module exploits vulnerabilities in multiple Zyxel devices including the VPN, USG and APT series.
2021
The affected firmware versions depend on the device module, see this module's documentation for more details.
22+
23+
Note this module was unable to be tested against a real Zyxel device and was tested against a mock environment.
24+
If you run into any issues testing this in a real environment we kindly ask you raise an issue in
25+
metasploit's github repository: https://github.com/rapid7/metasploit-framework/issues/new/choose
2126
},
2227
'Author' => [
2328
'SSD Secure Disclosure technical team', # discovery

0 commit comments

Comments
 (0)