exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 46 of 46 RSS Feed

Files from Michael Messner

Email addressmichael.messner at integralis.com
First Active2010-05-26
Last Active2024-09-01
DLink DIR-645 / DIR-815 diagnostic.php Command Execution
Posted Apr 11, 2013
Authored by Michael Messner, juan vazquez | Site metasploit.com

Some DLink Routers are vulnerable to OS Command injection in the web interface. On DIR-645 versions prior 1.03 authentication isn't needed to exploit it. On version 1.03 authentication is needed in order to trigger the vulnerability, which has been fixed definitely on version 1.04. Other DLink products, like DIR-300 rev B and DIR-600, are also affected by this vulnerability. Not every device includes wget which we need for deploying our payload. On such devices you could use the cmd generic payload and try to start telnetd or execute other commands. Since it is a blind os command injection vulnerability, there is no output for the executed command when using the cmd generic payload. A ping command against a controlled system could be used for testing purposes. This Metasploit module has been tested successfully on DIR-645 prior to 1.03, where authentication isn't needed in order to exploit the vulnerability.

tags | exploit, web
advisories | OSVDB-92144
SHA-256 | f2ceeefd8dbcad542f7e425fc2a4629e678ed768c94c49906f4e9341a1042096
Linksys WRT54GL apply.cgi Command Execution
Posted Apr 10, 2013
Authored by Michael Messner, juan vazquez | Site metasploit.com

Some Linksys Routers are vulnerable to an authenticated OS command injection in the Web Interface. Default credentials are admin/admin or admin/password. Since it is a blind os command injection vulnerability, there is no output for the executed command when using the cmd generic payload. A ping command against a controlled system could be used for testing purposes. The user must be prudent when using this module since it modifies the router configuration while exploitation, even when it tries to restore previous values.

tags | exploit, web
advisories | OSVDB-89912
SHA-256 | 842e633a501f723e29c147350b0f672da78b474050f74be28f55d1501d673b3c
D-Link Remote Command Execution
Posted Apr 9, 2013
Authored by Michael Messner

D-Link devices DIR-600 / DIR-300 revB / DIR-815 / DIR-645 / DIR-412 / DIR-456 / DIR-110 all suffer from a remote command injection vulnerability.

tags | exploit, remote
SHA-256 | 17eb6a8037069b38384464fb6033053265e37d9e03348a06ffc828a643e35041
Netgear DGN1000B setup.cgi Remote Command Execution
Posted Apr 4, 2013
Authored by Michael Messner, juan vazquez | Site metasploit.com

Some Netgear Routers are vulnerable to authenticated OS Command injection. The vulnerability exists in the web interface, specifically in the setup.cgi component, when handling the TimeToLive parameter. Default credentials are always a good starting point, admin/admin or admin/password could be a first try. Since it is a blind os command injection vulnerability, there is no output for the executed command when using the cmd generic payload. A ping command against a controlled system could be used for testing purposes.

tags | exploit, web, cgi
advisories | OSVDB-89985
SHA-256 | 623ce5343f36444ea84dd10286be202aa0da4fc1e9e606d5ba8d7544d69fb889
Linksys E1500/E2500 apply.cgi Remote Command Injection
Posted Apr 2, 2013
Authored by Michael Messner, juan vazquez | Site metasploit.com

Some Linksys Routers are vulnerable to an authenticated OS command injection. Default credentials for the web interface are admin/admin or admin/password. Since it is a blind os command injection vulnerability, there is no output for the executed command when using the cmd generic payload. A ping command against a controlled system could be used for testing purposes.

tags | exploit, web
advisories | OSVDB-89912
SHA-256 | b0afd45182320ce4cbe58cfbaef05397334c74a08e5a150118bf0469c6dc9d01
OpenPLI Webif Arbitrary Command Execution
Posted Mar 15, 2013
Authored by Michael Messner | Site metasploit.com

Some Dream Boxes with OpenPLI version 3 beta images are vulnerable to OS command injection in the Webif 6.0.4 web interface. This is a blind injection, which means that you will not see any output of your command. A ping command can be used for testing the vulnerability. This Metasploit module has been tested in a box with the next features: Linux Kernel version 2.6.9 (build@plibouwserver) (gcc version 3.4.4) #1 Wed Aug 17 23:54:07 CEST 2011, Firmware release 1.1.0 (27.01.2013), FP Firmware 1.06 and Web Interface 6.0.4-Expert (PLi edition).

tags | exploit, web, kernel
systems | linux
advisories | OSVDB-90230
SHA-256 | 08146370ff7e87193e0ac650501ba578d139728fdb5da79083867c3d68983b6c
Netgear DGN2200B Command Execution / Cross Site Scripting
Posted Feb 18, 2013
Authored by Michael Messner

Netgear DGN2200B suffers from remote command injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss
SHA-256 | 634264ce1a769f340ba92a3a358816a469ffa2e4015e8b04265695279dba696d
Edimax EW-7206APg / EW-7209APg Redirection / XSS / Header Injection
Posted Feb 15, 2013
Authored by Michael Messner

The Edimax EW-7206APg and EW-7209APg suffer from cross site scripting, HTTP header injection, and open redirection vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | caf5494f483d9fdfdddc161b8ffa759d8caa9aa9cf89ce0b6c0d0e843b783136
TP-Link TL-WA701N / TL-WA701ND Directory Traversal / XSS
Posted Feb 15, 2013
Authored by Michael Messner

The TP-Link TL-WA701N and TL-WA701ND suffer from stored cross site scripting and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
SHA-256 | 94e97a9978ccdf366f647fe8f6856515428f710579e8124bc4f97d8d7503a1d9
Raidsonic IB-NAS5220 / IB-NAS4220-B XSS / Authentication Bypass
Posted Feb 14, 2013
Authored by Michael Messner

Raidsonic versions IB-NAS5220 and IB-NAS4220-B suffer from authentication bypass and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, bypass
SHA-256 | fe8f5e0eadcb9f646b6f562ce732f7187fcdd832bcb2a1a6a738e78ba597f151
OpenPLI OS Command Execution / Cross Site Scripting
Posted Feb 13, 2013
Authored by Michael Messner

OpenPLI Dream Multimedia Box suffers from cross site scripting and remote OS command injection vulnerabilities.

tags | exploit, remote, vulnerability, xss
SHA-256 | f5d4feb4ba89383043e9c71ed9f5ca9c4929fef7a2cf63360283140f9e11618c
Linksys E1500 / E2500 XSS / CSRF / Traversal / Command Injection
Posted Feb 11, 2013
Authored by Michael Messner

Linksys E1500 and E2500 suffer from cross site request forgery, cross site scripting, remote command injection, and directory traversal vulnerabilities.

tags | exploit, remote, vulnerability, xss, file inclusion, csrf
SHA-256 | 8f4ca31ed3ff1f131edf930a3e632c1433e475e164124e9a7516f54e7b1af180
Linksys WRT160N XSS / CSRF / Command Injection
Posted Feb 11, 2013
Authored by Michael Messner

Linksys WRT160N suffers from cross site scripting, cross site request forgery, and remote command injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, file inclusion, csrf
SHA-256 | 39b1aacd1083769cd903e8b6c46c0bcef01ce5e97ca668800168ca3378fa2176
D-Link DIR-615 Rev H CSRF / Disclosure / Command Injection
Posted Feb 11, 2013
Authored by Michael Messner

D-Link DIR-615 rev H suffers from cross site request forgery, information disclosure, and remote command injection vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion, info disclosure, csrf
SHA-256 | 41b970b21adea1850727bf853c7a64b9e73638cbc268a00e301d4a225d17b956
Linksys WAG200G XSS / Command Injection
Posted Feb 11, 2013
Authored by Michael Messner

Linksys WAG200G suffers from cross site scripting and remote command injection vulnerabilities.

tags | exploit, remote, vulnerability, xss
SHA-256 | 2b6dddc567f756cb697c510a2e5bf2220a9fb207d776b1a3492dc2707810ea56
Netgear DGN1000B XSS / Command Injection
Posted Feb 8, 2013
Authored by Michael Messner

The Netgear N150 Wireless ADSL2+ Modem Router DGN1000 suffers from cross site scripting, OS command injection, and insecure cryptographic storage vulnerabilities. Firmware versions 1.1.00.24 and 1.1.00.45 are affected.

tags | exploit, vulnerability, xss
SHA-256 | dcec7c5cda6f10f1bbcd85f15e43d09cfdc1cbee7d31d660686584eb925c0e5c
Linksys E1500 / E2500 CSRF / XSS / Command Execution / Traversal
Posted Feb 5, 2013
Authored by Michael Messner

Linksys models E1500 and E2500 suffer from cross site request forgery, cross site scripting, OS command injection, and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion, csrf
SHA-256 | 2190f55bd127ac7423c9c743f4167459612f148b992042f0bd75b4b858c6d942
D-Link DIR-600 / DIR-300 Command Execution / Bypass / Disclosure
Posted Feb 5, 2013
Authored by Michael Messner

D-Link DIR-600 and DIR-300 suffer insecure cryptographic storage, remote command execution, information disclosure, and insecure password changing vulnerabilities.

tags | exploit, remote, vulnerability, info disclosure
SHA-256 | 0d610f0e7ac87b76802448b2ddefebf0a4f7d53a027f9b0de1b8a4e6d745c155
Netgear SPH200D XSS / Directory Traversal / Disclosure
Posted Jan 31, 2013
Authored by Michael Messner

Netgear SPH200D suffers from cross site scripting, path disclosure, and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
SHA-256 | feb81bf5c98699eaaac241a0def910ecd684f41727637e5be8c37af1a136cd6a
Linksys WRT54GL 1.1 XSS / OS Command Injection
Posted Jan 18, 2013
Authored by Michael Messner

Linksys WRT54GL version 1.1 suffers from remote OS command injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss
SHA-256 | c747a4881fe6f7e8e70cf9b1b6b621bdf6fad806004ab724ba2805579af13185
Webby Webserver 1.01 Buffer Overflow
Posted May 26, 2010
Authored by Michael Messner

Webby Webserver version 1.01 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | c1efddb1b13c33f48bca2724a4a2cd55dd316b60fd3c13ef1e71beab2ce48b4e
Page 2 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close