Skip to content

Conversation

@DePierre
Copy link
Contributor

Three modules to exploit vulnerabilities in HooToo TripMate series:

  • Unauthenticated Remote Code Execution in /sysfirm.csp
  • Multiple Instances of Unauthenticated Operating System Command Injection in open_forwarding
  • Unauthenticated Arbitrary File Upload

I am not entirely sure that I am using shell() correctly so feel free to tell me what to change in those modules :)

They are still unpatched as of today, as far as I can tell, despite attempting to report them since October, 2017.

@lucyoa
Copy link
Contributor

lucyoa commented Apr 27, 2018

Thanks for the contribution! Could you please separate this PR to multiple PRs so we can analyze all exploits separately?

@DePierre
Copy link
Contributor Author

DePierre commented Apr 27, 2018

Hi @lucyoa, I would usually comply with this kind of requests but I really think that it is not necessary here.

All 3 exploits are simple to understand (1 command execution, 1 command injection and 1 path traversal) and because they are already in a file of their own, less than 100 LoC each, you can review them one after the other.

@lucyoa lucyoa added the module label Jun 2, 2018
@s-b-repo
Copy link

s-b-repo commented Sep 1, 2024

we can just read through it

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants