module

Polycom Shell HDX Series Traceroute Command Execution

Disclosed
Nov 12, 2017
Created
Jun 14, 2018

Description

Within Polycom command shell, a command execution flaw exists in
lan traceroute, one of the dev commands, which allows for an
attacker to execute arbitrary payloads with telnet or openssl.

Authors

Mumbai
staaldraad
Paul Haas [email protected]
h00die [email protected]

Platform

Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/unix/misc/polycom_hdx_traceroute_exec
msf exploit(polycom_hdx_traceroute_exec) > show targets
...targets...
msf exploit(polycom_hdx_traceroute_exec) > set TARGET < target-id >
msf exploit(polycom_hdx_traceroute_exec) > show options
...show and set options...
msf exploit(polycom_hdx_traceroute_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.