iBall ADSL2+ Home Router Authentication Bypass

iBall ADSL2+ Home Router suffers from multiple authentication bypass vulnerabilities.

MD5 | 1d79305ff9e23d0f385e458888f5616f

# Exploit Title: iBall ADSL2+ Home Router Authentication Bypass Vulnerability
# CVE: CVE-2017-14244
# Date: 15-09-2017
# Exploit Author: Gem George
# Author Contact: https://www.linkedin.com/in/gemgrge
# Vulnerable Product: iBall ADSL2+ Home Router WRA150N https://www.iball.co.in/Product/ADSL2--Home-Router/746
# Firmware version: FW_iB-LR7011A_1.0.2
# Vendor Homepage: https://www.iball.co.in
# Reference: https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broadband-modem-authentication-bypass

Vulnerability Details
iBall ADSL2+ Home Router does not properly authenticate when pages are accessed through cgi version. This could potentially allow a remote attacker access sensitive information and perform actions such as reset router, downloading backup configuration, upload backup etc.

How to reproduce
Suppose is the router IP and one of the valid page in router is is, then the page can be directly accessed as as

Example URLs:
* a Status and details
* a Firmware Upgrade
* a perform backup settings to PC
* a PPPoE settings
* a Router reset
* a password settings

* https://www.youtube.com/watch?v=_SvrwCSdn54

++++++++++++++++++ www.0seccon.com ++++++++++++++++++

Related Posts