Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Dec 5, 2023
1 parent 10d4b92 commit a6e3b3b
Showing 1 changed file with 43 additions and 13 deletions.
56 changes: 43 additions & 13 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -90551,7 +90551,7 @@
"targets": [
"Auto"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2023-12-05 10:51:12 +0000",
"path": "/modules/exploits/linux/upnp/dlink_dir859_exec_ssdpcgi.rb",
"is_install_path": true,
"ref_name": "linux/upnp/dlink_dir859_exec_ssdpcgi",
Expand Down Expand Up @@ -90615,7 +90615,7 @@
"needs_cleanup": null
},
"exploit_linux/upnp/dlink_upnp_msearch_exec": {
"name": "D-Link Unauthenticated UPnP M-SEARCH Multicast Command Injection",
"name": "D-Link Unauthenticated Remote Command Execution using UPnP via a special crafted M-SEARCH packet.",
"fullname": "exploit/linux/upnp/dlink_upnp_msearch_exec",
"aliases": [

Expand All @@ -90624,35 +90624,65 @@
"disclosure_date": "2013-02-01",
"type": "exploit",
"author": [
"Zachary Cutlip",
"Michael Messner <[email protected]>"
"h00die-gr3y <[email protected]>",
"Zach Cutlip",
"Michael Messner <[email protected]>",
"Miguel Mendez Z. (s1kr10s)",
"Pablo Pollanco (secenv)",
"Naihsin https://github.com/naihsin"
],
"description": "Different D-Link Routers are vulnerable to OS command injection via UPnP Multicast\n requests. This module has been tested on DIR-300 and DIR-645 devices. Zachary Cutlip\n has initially reported the DIR-815 vulnerable. Probably there are other devices also\n affected.",
"description": "A command injection vulnerability exists in multiple D-Link network products, allowing an attacker\n to inject arbitrary command to the UPnP via a crafted M-SEARCH packet.\n Universal Plug and Play (UPnP), by default is enabled in most D-Link devices, on the port 1900.\n An attacker can perform a remote command execution by injecting the payload into the\n `Search Target` (ST) field of the SSDP M-SEARCH discover packet.\n After successful exploitation, an attacker will have full access with `root` user privileges.\n\n NOTE: Staged meterpreter payloads might core dump on the target, so use stage-less meterpreter payloads\n when using the Linux Dropper target. Some D-Link devices do not have the `wget` command so\n configure `echo` as flavor with the command set CMDSTAGER::FLAVOR echo.\n\n The following D-Link network products and firmware are vulnerable:\n - D-Link Router model GO-RT-AC750 revisions Ax with firmware v1.01 or older;\n - D-Link Router model DIR-300 revisions Ax with firmware v1.06 or older;\n - D-Link Router model DIR-300 revisions Bx with firmware v2.15 or older;\n - D-Link Router model DIR-600 revisions Bx with firmware v2.18 or older;\n - D-Link Router model DIR-645 revisions Ax with firmware v1.05 or older;\n - D-Link Router model DIR-815 revisions Bx with firmware v1.04 or older;\n - D-Link Router model DIR-816L revisions Bx with firmware v2.06 or older;\n - D-Link Router model DIR-817LW revisions Ax with firmware v1.04b01_hotfix or older;\n - D-Link Router model DIR-818LW revisions Bx with firmware v2.05b03_Beta08 or older;\n - D-Link Router model DIR-822 revisions Bx with firmware v2.03b01 or older;\n - D-Link Router model DIR-822 revisions Cx with firmware v3.12b04 or older;\n - D-Link Router model DIR-823 revisions Ax with firmware v1.00b06_Beta or older;\n - D-Link Router model DIR-845L revisions Ax with firmware v1.02b05 or older;\n - D-Link Router model DIR-860L revisions Ax with firmware v1.12b05 or older;\n - D-Link Router model DIR-859 revisions Ax with firmware v1.06b01Beta01 or older;\n - D-Link Router model DIR-860L revisions Ax with firmware v1.10b04 or older;\n - D-Link Router model DIR-860L revisions Bx with firmware v2.03b03 or older;\n - D-Link Router model DIR-865L revisions Ax with firmware v1.07b01 or older;\n - D-Link Router model DIR-868L revisions Ax with firmware v1.12b04 or older;\n - D-Link Router model DIR-868L revisions Bx with firmware v2.05b02 or older;\n - D-Link Router model DIR-869 revisions Ax with firmware v1.03b02Beta02 or older;\n - D-Link Router model DIR-880L revisions Ax with firmware v1.08b04 or older;\n - D-Link Router model DIR-890L/R revisions Ax with firmware v1.11b01_Beta01 or older;\n - D-Link Router model DIR-885L/R revisions Ax with firmware v1.12b05 or older;\n - D-Link Router model DIR-895L/R revisions Ax with firmware v1.12b10 or older;\n - probably more looking at the scale of impacted devices :-(",
"references": [
"CVE-2023-33625",
"CVE-2020-15893",
"CVE-2019-20215",
"URL-https://attackerkb.com/topics/uqicA23ecz/cve-2023-33625",
"URL-https://github.com/zcutlip/exploit-poc/tree/master/dlink/dir-815-a1/upnp-command-injection",
"URL-http://shadow-file.blogspot.com/2013/02/dlink-dir-815-upnp-command-injection.html"
"URL-https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-rce-in-ssdpcgi-http-st-cve-2019-20215-en-2e799acb8a73",
"URL-https://shadow-file.blogspot.com/2013/02/dlink-dir-815-upnp-command-injection.html",
"URL-https://research.loginsoft.com/vulnerability/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/",
"URL-https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/cmd%20injection/README.md"
],
"platform": "",
"arch": "",
"platform": "Linux,Unix",
"arch": "cmd, mipsle, mipsbe, armle",
"rport": 1900,
"autofilter_ports": [

80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [

"http",
"https"
],
"targets": [
"MIPS Little Endian",
"MIPS Big Endian"
"Unix Command",
"Linux Dropper"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2023-11-14 20:40:38 +0000",
"path": "/modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb",
"is_install_path": true,
"ref_name": "linux/upnp/dlink_upnp_msearch_exec",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"repeatable-session"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
Expand Down

0 comments on commit a6e3b3b

Please sign in to comment.