Announcing Incident Command! The AI powered Next-Gen SIEMLearn more.

module

Netgear DGN2200B pppoe.cgi Remote Command Execution

Disclosed
Feb 15, 2013
Created
May 30, 2018

Description

Some Netgear Routers are vulnerable to an authenticated OS command injection
on their web interface. Default credentials for the web interface are admin/admin
or admin/password. Since it is a blind os command injection vulnerability, there
is no output for the executed command when using the cmd generic payload. A ping
command against a controlled system could be used for testing purposes. This module
overwrites parts of the PPOE configuration, while the module tries to restore it
after exploitation configuration backup is recommended.

Authors

Michael Messner devnull@s3cur1ty.de
juan vazquez juan.vazquez@metasploit.com

Platform

Linux,Unix

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/linux/http/netgear_dgn2200b_pppoe_exec
msf exploit(netgear_dgn2200b_pppoe_exec) > show targets
...targets...
msf exploit(netgear_dgn2200b_pppoe_exec) > set TARGET < target-id >
msf exploit(netgear_dgn2200b_pppoe_exec) > show options
...show and set options...
msf exploit(netgear_dgn2200b_pppoe_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.