exploit-db-mirror/exploits/hardware/webapps/11677.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

58 lines
No EOL
1.7 KiB
Text
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

=========================================
Yaniv Miron aka "Lament" Advisory March 7, 2010
Friendly-Tech FriendlyTR69 CPE Remote Management V2.8.9 SQL Injection Vulnerability
=========================================
=====================
I. BACKGROUND
=====================
Based on the companys technical expertise and a decade of hands-on experience
in the telecom industry, Friendlys solution is a ROBUST, SCALABLE, SECURED,
TELCO GRADE and COST-EFFECTIVE TR-069 solution.
The TR-069 protocol was accepted as the standard for CPE management by the
DSL, WiMAX, NGN / Optical network providers (some Cable operators are
deploying TR-069 as well).
Device Management & Auto Provisioning
Friendlys TR-069 solution delivers comprehensive remote management and
auto-provisioning of CPEs that support the TR-069 standard - including modem/routers,
IPTV/ STBs, ATA/VoIP, storage devices, media centers, etc.
http://www.friendly-tech.com/remotemamagment.asp
=====================
II. DESCRIPTION
=====================
The Friendly-Tech FriendlyTR69 CPE Remote Management is prone to SQL injection attacks.
=====================
III. ANALYSIS
=====================
The vulnerability occurs due to insufficient sanitization of user-supplied data when logging onto the FriendlyTR69 CPE Remote Management.
Successful exploitation may result in an attacker obtaining admin access to the FriendlyTR69 CPE Remote Management.
=====================
IV. EXPLOIT
=====================
Username: ' or 1=1--
Password: ' or 1=1--
=====================
V. DISCLOSURE TIMELINE
=====================
Jan 2009 Vulnerability Found
Jan 2009 Vendor Notification
March 2010 Public Disclosure
=====================
VI. CREDIT
=====================
Yaniv Miron aka "Lament".
lament@ilhack.org