Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
513b53dc
Commit
513b53dc
authored
Mar 11, 2017
by
lucyoa
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Netgear password disclosure exploit - improvements
parent
ce84d3be
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
26 additions
and
27 deletions
+26
-27
multi_password_disclosure-2017-5521.py
...s/exploits/netgear/multi_password_disclosure-2017-5521.py
+26
-27
No files found.
routersploit/modules/exploits/netgear/multi_password_disclosure-2017
0
1.py
→
routersploit/modules/exploits/netgear/multi_password_disclosure-2017
-552
1.py
View file @
513b53dc
...
@@ -12,13 +12,16 @@ from routersploit import (
...
@@ -12,13 +12,16 @@ from routersploit import (
class
Exploit
(
exploits
.
Exploit
):
class
Exploit
(
exploits
.
Exploit
):
"""
"""
Exploit implementation for multiple NETGEAR routers password disclosure vulnerability.
Exploit implementation for multiple NETGEAR routers password disclosure vulnerability.
If the target is vulnerable, it allows read credentials for administration user.
If the target is vulnerable, it allows
to
read credentials for administration user.
"""
"""
__info__
=
{
__info__
=
{
'name'
:
'Netgear Multiple Vulnerabilities'
,
'name'
:
'Netgear Multi Password Disclosure'
,
'description'
:
'Remote and Local Password Disclosure.'
,
'description'
:
'Module exploits Password Disclosure vulnerability in multiple Netgear devices. '
'If target is vulnerable administrator
\'
s password is retrieved. '
'This exploit only works if
\'
password recovery
\'
in router settings is OFF. '
'If the exploit has already been run, then it might not work anymore until device reboot.'
,
'authors'
:
[
'authors'
:
[
'Simon Kenin
of Trustwave SpiderLabs
'
,
# vulnerability discovery
'Simon Kenin
<Trustwave SpiderLabs>
'
,
# vulnerability discovery
'0BuRner'
,
# routersploit module
'0BuRner'
,
# routersploit module
],
],
'references'
:
[
'references'
:
[
...
@@ -29,30 +32,26 @@ class Exploit(exploits.Exploit):
...
@@ -29,30 +32,26 @@ class Exploit(exploits.Exploit):
'http://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability'
'http://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability'
],
],
'devices'
:
[
'devices'
:
[
'D6220'
,
'
Netgear
D6220'
,
'D6400'
,
'
Netgear
D6400'
,
'R6200v2'
,
'
Netgear
R6200v2'
,
'R6250'
,
'
Netgear
R6250'
,
'R6300v2'
,
'
Netgear
R6300v2'
,
'R6400'
,
'
Netgear
R6400'
,
'R6700'
,
'
Netgear
R6700'
,
'R6900'
,
'
Netgear
R6900'
,
'R7000'
,
'
Netgear
R7000'
,
'R7100LG'
,
'
Netgear
R7100LG'
,
'R7300DST'
,
'
Netgear
R7300DST'
,
'R7900'
,
'
Netgear
R7900'
,
'R8000'
,
'
Netgear
R8000'
,
'R8300'
,
'
Netgear
R8300'
,
'R8500'
,
'
Netgear
R8500'
,
'WNDR3400v2'
,
'
Netgear
WNDR3400v2'
,
'WNDR3400v3'
,
'
Netgear
WNDR3400v3'
,
'WNR3500Lv2'
,
'
Netgear
WNR3500Lv2'
,
'WNDR4500v2'
,
'
Netgear
WNDR4500v2'
,
],
],
'limitations'
:
[
"This exploit only works if 'password recovery' in router settings is OFF."
,
"If the exploit has already been run, then it might not work anymore until device reboot."
]
}
}
target
=
exploits
.
Option
(
''
,
'Target address e.g. http://192.168.1.1'
,
validators
=
validators
.
url
)
target
=
exploits
.
Option
(
''
,
'Target address e.g. http://192.168.1.1'
,
validators
=
validators
.
url
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment