module

Ubiquiti airOS Arbitrary File Upload

Disclosed
2016-02-13
Created
2018-05-30

Description

This module exploits a pre-auth file upload to install a new root user
to /etc/passwd and an SSH key to /etc/dropbear/authorized_keys.

FYI, /etc/{passwd,dropbear/authorized_keys} will be overwritten.
/etc/persistent/rc.poststart will be overwritten if PERSIST_ETC is true.

This method is used by the "mf" malware infecting these devices.

Authors

93c08539
wvu wvu@metasploit.com

Platform

Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/ssh/ubiquiti_airos_file_upload
msf exploit(ubiquiti_airos_file_upload) > show targets
...targets...
msf exploit(ubiquiti_airos_file_upload) > set TARGET < target-id >
msf exploit(ubiquiti_airos_file_upload) > show options
...show and set options...
msf exploit(ubiquiti_airos_file_upload) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.