module

D-Link/TRENDnet NCC Service Command Injection

Disclosed
2015-02-26
Created
2018-05-30

Description

This module exploits a remote command injection vulnerability on several routers. The
vulnerability exists in the ncc service, while handling ping commands. This module has
been tested on a DIR-626L emulated environment. Several D-Link and TRENDnet devices
are reported as affected, including: D-Link DIR-626L (Rev A) v1.04b04, D-Link DIR-636L
(Rev A) v1.04, D-Link DIR-808L (Rev A) v1.03b05, D-Link DIR-810L (Rev A) v1.01b04, D-Link
DIR-810L (Rev B) v2.02b01, D-Link DIR-820L (Rev A) v1.02B10, D-Link DIR-820L (Rev A)
v1.05B03, D-Link DIR-820L (Rev B) v2.01b02, D-Link DIR-826L (Rev A) v1.00b23, D-Link
DIR-830L (Rev A) v1.00b07, D-Link DIR-836L (Rev A) v1.01b03 and TRENDnet TEW-731BR (Rev 2)
v2.01b01

Authors

Peter Adkins peter.adkins@kernelpicnic.net
Tiago Caetano Henriques
Michael Messner devnull@s3cur1ty.de

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/multi_ncc_ping_exec
msf exploit(multi_ncc_ping_exec) > show targets
...targets...
msf exploit(multi_ncc_ping_exec) > set TARGET < target-id >
msf exploit(multi_ncc_ping_exec) > show options
...show and set options...
msf exploit(multi_ncc_ping_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.