-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ASUS infosvr Auth Bypass Command Execution exploit #9247
Conversation
I realized I don't have an asus router handy, so I ordered a cheap one. I'd pair testing with #9441 |
@bwatters-r7 now that you've ordered a device, it's probably a good time to mention that this module, and the module in PR #9441, likely won't work with ancient ASUS RX series routers which don't appear to have an infosvr service listening on port 9999/udp. At least, not at boot. Additionally, the module in PR #9441 is unlikely to work on ASUS RT-N12E model routers as they don't have a |
Heh; no worries. It is an RT model, and if it does not work, meh. |
@bcoles the vpnupload.cgi file is not a real file - just a function handle inside the httpd server! So check it out on your router, it still might work. |
Hey @pedrib - nice work on the I've replied in your PR. |
FWIW, I have the RT-N12 HW ver D1, and it does have something listening on UDP port 9999: Unfortunately, the exploit fails, but I have not had any time to figure out why:
|
@bwatters-r7 :( Is the firmware up to date? The infosvr bug is a few years old now. Some known patched firmware versions are listed here: https://github.com/jduck/asus-cmd It might be worth trying the scanner module in #9245 to check if the device is vulnerable. It seems (almost) every ASUS router does have the infosvr service, except the RX series. |
One important note which should probably be documented somewhere, is the nature of shell termination. When you When you |
I was not able to get this to work after downgrading to FW 3.0.0.4.374_813 on my RT-N12D1. It did work with #9441 |
@bwatters-r7 I would have thought that version would be vulnerable. But again, the versioning scheme isn't a reliable guide. Does the scanner module flag the device as vulnerable ? |
@bwatters-r7 Alternatively, jduck's asus-cmd tool should tell you if a device is vulnerable. Note that the default command executed is |
Renamed for clarity. When I wrote this module it was the only ASUS infosvr module in the framework. That will no longer be the case soon. |
Bump. Anyone happen to have an ASUS router? Alternatively, I can provide a pcap. |
@bcoles, I'd say it is time for a pcap, if you have one. |
Sorry guys. I've sold my unit after I finished the exploit, so don't have any available. |
pcap sent |
Release Notes:This PR adds an ASUS infosvr Unauthenticated Command Execution exploit (CVE-2014-9583). |
Thanks |
This PR adds an ASUS infosvr Unauthenticated Command Execution exploit (CVE-2014-9583).
Example Output