module

Linksys WVBR0-25 User-Agent Command Execution

Disclosed
Dec 13, 2017
Created
Jun 14, 2018

Description

The Linksys WVBR0-25 Wireless Video Bridge, used by DirecTV to connect wireless Genie
cable boxes to the Genie DVR, is vulnerable to OS command injection in version
of the web management portal via the User-Agent header. Authentication is not required to
exploit this vulnerability.

Author

HeadlessZeke

Platform

Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > show targets
...targets...
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > set TARGET < target-id >
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > show options
...show and set options...
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.