Cambium ePMP1000 'ping' Shell via Command Injection (up to v2.5)
This module exploits an OS Command Injection vulnerability in Cambium ePMP1000 device management portal. It requires any one of the following login credentials - admin/admin, installer/installer, home/home - to set up a reverse netcat shell.
Module Name
exploit/unix/http/epmp1000_ping_cmd_shell
Authors
- Karn Ganeshen <KarnGaneshen [at] gmail.com>
References
Targets
- EPMP
Platforms
- unix
Architectures
- cmd
Reliability
Development
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/unix/http/epmp1000_ping_cmd_shell
msf exploit(epmp1000_ping_cmd_shell) > show targets
...targets...
msf exploit(epmp1000_ping_cmd_shell) > set TARGET <target-id>
msf exploit(epmp1000_ping_cmd_shell) > show options
...show and set options...
msf exploit(epmp1000_ping_cmd_shell) > exploit