module

Cambium cnPilot r200/r201 Command Execution as 'root'

Disclosed
N/A
Created
Jun 14, 2018

Description

Cambium cnPilot r200/r201 device software versions 4.2.3-R4 to
4.3.3-R4, contain an undocumented, backdoor 'root' shell. This shell is
accessible via a specific url, to any authenticated user. The module uses this
shell to execute arbitrary system commands as 'root'.

Author

Karn Ganeshen [email protected]

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/admin/http/cnpilot_r_cmd_exec
msf auxiliary(cnpilot_r_cmd_exec) > show actions
...actions...
msf auxiliary(cnpilot_r_cmd_exec) > set ACTION < action-name >
msf auxiliary(cnpilot_r_cmd_exec) > show options
...show and set options...
msf auxiliary(cnpilot_r_cmd_exec) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.