FLIR AX8 Thermal Camera 1.32.16 – Hard-Coded Credentials

  • 作者: LiquidWorm
    日期: 2018-10-17
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/45629/
  • # Exploit Title: FLIR AX8 Thermal Camera 1.32.16 - Hard-Coded Credentials
    # Author: Gjoko 'LiquidWorm' Krstic @zeroscience
    # Date: 2018-10-14
    # Vendor: FLIR Systems, Inc
    # Product web page: https://www.flir.com
    # Affected version: Firmware: 1.32.16, 1.17.13, OS: neco_v1.8-0-g7ffe5b3
    # Hardware: Flir Systems Neco Board
    # Tested on: GNU/Linux 3.0.35-flir+gfd883a0 (armv7l), lighttpd/1.4.33, PHP/5.4.14
    # References:
    # Advisory ID: ZSL-2018-5494
    # Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5494.php
    
    # Desc: The devices utilizes hard-coded and credentials within its Linux distribution
    # image. These sets of credentials (SSH) are never exposed to the end-user and cannot
    # be changed through any normal operation of the camera. Attacker could exploit this
    # vulnerability by logging in using the default credentials for the web panel or gain
    # shell access.
    
    # Hard-coded SSH access:
    # ----------------------
    
    fliruser:3vlig
    root:hello
    
    # Default web creds:
    # ------------------
    
    admin:admin
    user:user
    viewer:viewer
    service:???
    developer:???