what you don't know can hurt you

NETGEAR WMS Authentication Bypass / Privilege Escalation

NETGEAR WMS Authentication Bypass / Privilege Escalation
Posted Sep 7, 2015
Authored by Elliott Lewis

NETGEAR WMS5316 ProSafe 16AP Wireless Management System suffers from authentication bypass and privilege escalation vulnerabilities.

tags | exploit, vulnerability, bypass
MD5 | bb9efcdd5241eb92f9279663ae323dde

NETGEAR WMS Authentication Bypass / Privilege Escalation

Change Mirror Download
NETGEAR Wireless Management System - Authentication Bypass and
Privilege Escalation.
WMS5316 ProSafe 16AP Wireless Management System - Firmware
(Build 1236).

[-] Vulnerability Information:
Title: NETGEAR Wireless Management System - Authentication Bypass and
Privilege Escalation
CVE: Not assigned
Product: WMS5316 ProSafe 16AP Wireless Management System
Affected Version: Firmware (Build 1236)
Fixed Version: Not publicly available

[-] Disclosure Timeline:
Vulnerability identified by Reinforce Services

Support case created with NETGEAR.

Vendor requested further information.

Issue escalated within NETGEAR.

Issue confirmed by vendor.

Vendor confirmed issue present in other controllers (details unknown)
Beta update for WMS5316 expected first week of June.

Vendor releases firmware version 2.1.5 that now contains a fix.
(Note: This has not been tested to confirm the issue is resolved)

[-] Proof of Concept:
wget --keep-session-cookies --save-cookies=cookies.txt
--post-data="reqMethod=auth_user&jsonData=%7B%22user_name%22%3A%20%22ANYTHING%22%2C%20%22password%22%3A%20%22&%22%7D" && wget

[-] Vulnerability Details:
The process to bypass authentication and escalate privileges is as follows:

Include the "&" symbol anywhere in the password value in the login
request (as raw content - it must not be encoded).

After a moment, the system will accept those credentials and grant
access to the GUI. The account appears somewhat restricted - but this
is only client side.

Send a request to add a new administrative user.

The new admin account is then available for use as created above.

Note: As an alternative, it is trivial to modify the Java code on it's
way down to a browser to enable all of the admin functions rather than
creating a new user.
This worked as well - so it's not strictly necessary to create a new
user; the bypass 'user' has full admin access if needed (leaving less
indicators of compromise)

[-] Credits:
Vulnerability discovered by Elliott Lewis of Reinforce Services

[-] Copyright:
Copyright (c) Reinforce Services Limited 2015, All rights reserved
worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered
in any way without the express written consent of Reinforce Services

[-] Disclaimer:
The information herein contained may change without notice. Use of
this information constitutes acceptance for use in an AS IS condition.
There are NO warranties, implied or otherwise, with regard to this
information or its use. Any use of this information is at the user's
risk. In no event shall the author/distributor (Reinforce Services
Limited) be held liable for any damages whatsoever arising out of or
in connection with the use or spread of this information.
Login or Register to add favorites

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By