Commit 513b53dc by lucyoa

Netgear password disclosure exploit - improvements

parent ce84d3be
......@@ -12,13 +12,16 @@ from routersploit import (
class Exploit(exploits.Exploit):
"""
Exploit implementation for multiple NETGEAR routers password disclosure vulnerability.
If the target is vulnerable, it allows read credentials for administration user.
If the target is vulnerable, it allows to read credentials for administration user.
"""
__info__ = {
'name': 'Netgear Multiple Vulnerabilities',
'description': 'Remote and Local Password Disclosure.',
'name': 'Netgear Multi Password Disclosure',
'description': 'Module exploits Password Disclosure vulnerability in multiple Netgear devices. '
'If target is vulnerable administrator\'s password is retrieved. '
'This exploit only works if \'password recovery\' in router settings is OFF. '
'If the exploit has already been run, then it might not work anymore until device reboot.',
'authors': [
'Simon Kenin of Trustwave SpiderLabs', # vulnerability discovery
'Simon Kenin <Trustwave SpiderLabs>', # vulnerability discovery
'0BuRner', # routersploit module
],
'references': [
......@@ -29,30 +32,26 @@ class Exploit(exploits.Exploit):
'http://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability'
],
'devices': [
'D6220',
'D6400',
'R6200v2',
'R6250',
'R6300v2',
'R6400',
'R6700',
'R6900',
'R7000',
'R7100LG',
'R7300DST',
'R7900',
'R8000',
'R8300',
'R8500',
'WNDR3400v2',
'WNDR3400v3',
'WNR3500Lv2',
'WNDR4500v2',
'Netgear D6220',
'Netgear D6400',
'Netgear R6200v2',
'Netgear R6250',
'Netgear R6300v2',
'Netgear R6400',
'Netgear R6700',
'Netgear R6900',
'Netgear R7000',
'Netgear R7100LG',
'Netgear R7300DST',
'Netgear R7900',
'Netgear R8000',
'Netgear R8300',
'Netgear R8500',
'Netgear WNDR3400v2',
'Netgear WNDR3400v3',
'Netgear WNR3500Lv2',
'Netgear WNDR4500v2',
],
'limitations': [
"This exploit only works if 'password recovery' in router settings is OFF.",
"If the exploit has already been run, then it might not work anymore until device reboot."
]
}
target = exploits.Option('', 'Target address e.g. http://192.168.1.1', validators=validators.url)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment