Vulnerability & Exploit Database

Back to search

Cambium ePMP 1000 'ping' Password Hash Extractor (up to v2.5)

This module exploits an OS Command Injection vulnerability in Cambium ePMP 1000 (<v2.5) device management portal. It requires any one of the following login credentials - admin/admin, installer/installer, home/home - to dump system hashes.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

auxiliary/scanner/http/epmp1000_dump_hashes

Authors

  • Karn Ganeshen <KarnGaneshen [at] gmail.com>

References

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/http/epmp1000_dump_hashes msf auxiliary(epmp1000_dump_hashes) > show actions ...actions... msf auxiliary(epmp1000_dump_hashes) > set ACTION <action-name> msf auxiliary(epmp1000_dump_hashes) > show options ...show and set options... msf auxiliary(epmp1000_dump_hashes) > run