Exploit for Linksys E1500 and E2500 devices Remote Code Execution vulnerability.
If the target is vulnerable, command loop is invoked that allows executing commands with root privileges.
"""
__info__={
'name':'Linksys E1500/E2500',
'description':'Module exploits remote command execution in Linksys E1500/E2500 devices. Diagnostics interface allows executing root privileged shell commands is available on dedicated web pages on the device.',
'authors':[
'Michael Messner',# vulnerability discovery
'Esteban Rodriguez (n00py)',# routersploit module
],
'references':[
'https://www.exploit-db.com/exploits/24475/',
],
'targets':[
'Linksys E1500/E2500',
]
}
target=exploits.Option('','Target address e.g. http://192.168.1.1')
port=exploits.Option(80,'Target Port')
username=exploits.Option('admin','Username to login with')
password=exploits.Option('admin','Password to login with')
If the target is vulnerable command shell is invoked.
"""
__info__={
'name':'Netgear ProSafe RCE',
'description':'Module exploits remote command execution vulnerability in Netgear ProSafe WC9500, WC7600, WC7520 devices. If the target is vulnerable command shell is invoked.',