module
Cambium ePMP1000 'ping' Shell via Command Injection (up to v2.5)
Disclosed | Created |
---|---|
2015-11-28 | 2018-06-14 |
Disclosed
2015-11-28
Created
2018-06-14
Description
This module exploits an OS Command Injection vulnerability in Cambium
ePMP1000 device management portal. It requires any one of the following login
credentials - admin/admin, installer/installer, home/home - to set up a reverse
netcat shell.
ePMP1000 device management portal. It requires any one of the following login
credentials - admin/admin, installer/installer, home/home - to set up a reverse
netcat shell.
Author
Karn Ganeshen KarnGaneshen@gmail.com
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.