ID

VAR-E-201702-0236


CVE

cve_id:CVE-2017-6351

Trust: 1.5

sources: PACKETSTORM: 141391 // EXPLOIT-DB: 41480

EDB ID

41480


TITLE

WePresent WiPG-1500 - Backdoor Account - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 41480

DESCRIPTION

WePresent WiPG-1500 - Backdoor Account. CVE-2017-6351 . remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 41480

AFFECTED PRODUCTS

vendor:wepresentmodel:wipg-1500scope: - version: -

Trust: 2.1

sources: PACKETSTORM: 141391 // EXPLOIT-DB: 41480 // EDBNET: 91677

EXPLOIT

# Exploit Title: CVE-2017-6351 - WePresent undocumented privileged manufacturer backdoor account
# Date: 27/02/2017
# Exploit Author: Quentin Olagne
# Vendor Homepage: http://www.wepresentwifi.com/ or http://www.awindinc.com/products_wepresent_wipg_1500.html
# Software Link: http://www.awindinc.com/products_wepresent_wipg_1500.html
# Version: All versions of WiPG-1500 devices up to the latest firmware (1.0.3.7)
# Tested on: Latest firmware (1.0.3.7) of WiPG-1500 device
# CVE : CVE-2017-6351

WiPG-1500 device embeds a firmware with a manufacturer account with hard coded username / password.
Once the device is set in DEBUG mode, an attacker can connect to the device using telnet protocol and log in the device with the 'abarco' hard-coded manufacturer account.

This account is not documented, neither the DEBUG feature nor the use of telnetd on a port TCP/5885 (when debug mode is ON).

Here's the extract of the linux 'passwd' file:
root:x:0:0:root:/home:/bin/sh
abarco:x:1000:0:Awind-Barco User,,,:/home:/bin/sh

and the 'shadow':
root:$1$x1mFoD3w$uuvn.Z0p.XagX29uN3/Oa.:0:0:99999:7:::
abarco:$1$JB0Pn5dA$sROUF.bZVoQSjVrV06fIx1:0:0:99999:7:::

This vulnerability has been reported to the vendor but this product (WiPG-1500) is no longer maintained. This means it's a #WONTFIX vulnerability. Vendor has removed the 'abarco' account on the newest models but don't worry, DEBUG mode is still there with telnetd and you can also use the r00t account with a home and /bin/sh on the other systems in any case.

Trust: 1.0

sources: EXPLOIT-DB: 41480

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 41480

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 41480

TYPE

Backdoor Account

Trust: 1.6

sources: EXPLOIT-DB: 41480 // EDBNET: 91677

TAGS

tag:exploit

Trust: 0.5

sources: PACKETSTORM: 141391

CREDITS

Quentin Olagne

Trust: 0.6

sources: EXPLOIT-DB: 41480

EXTERNAL IDS

db:EXPLOIT-DBid:41480

Trust: 1.6

db:NVDid:CVE-2017-6351

Trust: 1.5

db:EDBNETid:91677

Trust: 0.6

db:PACKETSTORMid:141391

Trust: 0.5

sources: PACKETSTORM: 141391 // EXPLOIT-DB: 41480 // EDBNET: 91677

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2017-6351

Trust: 1.5

url:https://www.exploit-db.com/exploits/41480/

Trust: 0.6

sources: PACKETSTORM: 141391 // EXPLOIT-DB: 41480 // EDBNET: 91677

SOURCES

db:PACKETSTORMid:141391
db:EXPLOIT-DBid:41480
db:EDBNETid:91677

LAST UPDATE DATE

2022-07-27T09:47:10.437000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:141391date:2017-03-01T14:44:44
db:EXPLOIT-DBid:41480date:2017-02-27T00:00:00
db:EDBNETid:91677date:2017-02-27T00:00:00