Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-47040: GitHub - leoservalli/Privilege-escalation-ASKEY: Privilege escalation vulnerability on ASKEY routers

An issue in ASKEY router RTF3505VW-N1 BR_SV_g000_R3505VMN1001_s32_7 allows attackers to escalate privileges via running the tcpdump command after placing a crafted file in the /tmp directory and sending crafted packets through port 80.

CVE
#vulnerability#web#linux#git#ssh

Privilege-escalation-ASKEY-Router-RTF3505VW-N1

CVE-2022-47040

Privilege escalation vulnerability on ASKEY routers

Device: ASKEY RTF3505VW-N1

Firmware: BR_SV_g000_R3505VMN1001_s32_7 (not tested in other version)

CLI Version: Reduced_CLI_HGU_v13

Exploit:

ASKEY RTF3505VW-N1 devices are provided with access through ssh into a restricted default shell:

The restricted shell has access to a "Reduced_CLI”, and the environment is restricted to avoid execution of most linux/unix commands.

The command “tcpdump” is present in the restricted shell and do not handle correctly the -z flag, so it can be used to escalate privileges through the creation of a local file in the /tmp directory of the router, and injecting packets through port 80 (used for the router’s Web GUI) with the string “;/bin/bash” in order to be executed by "-z sh". By using “;/bin/bash” as injected string we can spawn a busybox/ash console.

As seen on the next images, we set a listen “nc” on port 4444, and run a Bash/Expect script with the exploit:

The reverse shell is created in order of get a stable connection with the router:

So it is possible to escalate privileges by spawning a full interoperable console with root privileges (see next image):

Through this escalation we can change the content of /etc/passwd (/var/passwd), create new users, access restricted data/files, or change any other system resource permanently.

The user “support” is provided printed on the back of the router. In some cases, this routers use default credentials.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda