module

Netgear PNPX_GetShareFolderList Authentication Bypass

Disclosed
Sep 6, 2021
Created
Sep 25, 2021

Description

This module targets an authentication bypass vulnerability in the mini_http binary of several Netgear Routers
running firmware versions prior to 1.2.0.88, 1.0.1.80, 1.1.0.110, and 1.1.0.84. The vulnerability allows
unauthenticated attackers to reveal the password for the admin user that is used to log into the
router's administrative portal, in plaintext.

Once the password has been been obtained, the exploit enables telnet on the target router and then utiltizes
the auxiliary/scanner/telnet/telnet_login module to log into the router using the stolen credentials of the
admin user. This will result in the attacker obtaining a new telnet session as the "root" user.

This vulnerability was discovered and exploited by an independent security researcher who reported it to SSD.

Authors

Unknown
Grant Willcox

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/admin/http/netgear_pnpx_getsharefolderlist_auth_bypass
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > show actions
...actions...
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > set ACTION < action-name >
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > show options
...show and set options...
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.