-
Notifications
You must be signed in to change notification settings - Fork 14.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WRT120N v1.0.0.7 stack overflow, ROP to 4-byte overwrite which clears the admin password - by Craig Heffner #3023
Conversation
|
||
def initialize(info = {}) | ||
super(update_info(info, | ||
'Name' => 'Linksys WRT120N Buffer Overflow in tmUnblock - Password Reset', |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just Linksys WRT120N tmUnblock Buffer Overflow
looks like a better title
I'm trying on a Linksys WRT120N, Firmware Version: v1.0.07 WRT120N with both Local Management and Remote Management available through HTTP, no success :S (neither with the original PoC). |
Not working for me :\ A request like that:
Answer with:
In requests with long Since I don't have the ability to debug atm, let me give a chance to @jvennix-r7 to test it, since he was interested and maybe I'm forgetting something |
My WRT120N v1.0.0.7 works good. Should I send you the pcap? |
@juan that's strange, I was testing that POST route yesterday and got "connection closed", not a 404. I will dive in soon |
@jvennix-r7 not a 404 here neither, no rush, when you have the time :) @m-1-k-3 pcap would be helpful if you could share :) thanks! |
Okay, I got this working. I had to reset the router firmware to the available 1.0.07. @jvazquez-r7: it's possible that some modification/setting I changed was messing things up. Against the newly updated firmware it seems to work well, even when run multiple times in a row. @m-i-k-3 could you change the result:
To just test logging in with admin:'', and print a success message then |
@jvennix-r7 very cool! I will include all updates to the module tomorrow. |
+1 thanks both @jvennix-r7 and @m-1-k-3 , you are great guys :D |
def run | ||
uri = '/cgi-bin/tmUnblock.cgi' | ||
|
||
print_status("#{rhost}:#{rport} - Resetting password for the admin user ...") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can do #{peer}
here. Either Mike can do it, or whoever's merging this PR can just change it.
msf auxiliary(linksys_tmunblock_admin_reset_bof) > run [] 192.168.1.1:80 - Trying to login with admin and empty password |
Awesome, processing! thanks @m-1-k-3! |
This is the great new exploit for the WRT120N. The vulnerability was discovered by Craig Heffner. Also the original exploit is his work thumbs up
Original exploit: http://www.exploit-db.com/exploits/31758/
Best,
Mike