vendor:
HOTBOX Router/Modem
by:
Oz Elisyan
N/A
CVSS
HIGH
Multiple
264, 287, 200, 22, 79
CWE
Product Name: HOTBOX Router/Modem
Affected Version From: 2.1.11
Affected Version To: Possibly earlier versions
Patch Exists: NO
Related CWE: CVE-2013-5037, CVE-2013-5038, CVE-2013-5220, CVE-2013-5219, CVE-2013-5218, CVE-2013-5039
CPE: h:sagemcom:fast_3184
Metasploit:
https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-5194/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7692/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-5219/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-7691/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-7692/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-7701/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-7852/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-5195/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7852/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-5194/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7691/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7701/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-7691/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-7701/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-7702/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-7703/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-7852/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7702/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7692/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7701/, https://www.rapid7.com/db/?q=CVE-2013-5219&type=&page=2, https://www.rapid7.com/db/?q=CVE-2013-5219&type=&page=2
Other Scripts:
https://www.infosecmatter.com/metasploit-auxiliary-modules-detailed-spreadsheet/, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/synology_dsm_sliceupload_exec_noauth, https://www.infosecmatter.com/list-of-metasploit-linux-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/metasploit-module-library/, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/http/tplink_traversal_noauth, https://www.infosecmatter.com/nessus-plugin-library/?id=102322, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/browser/firefox_svg_plugin, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/browser/java_storeimagearray, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/http/jboss_seam_upload_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=66697, https://www.infosecmatter.com/nessus-plugin-library/?id=67708, https://www.infosecmatter.com/nessus-plugin-library/?id=71433, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/misc/sercomm_exec, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/scada/codesys_gateway_server_traversal
Platforms Tested:
2013
HOTBOX Multiple Vulnerabilities
The HOTBOX router/modem appliance manufactured by SAGEMCOM and carries the model name F@st 3184 is vulnerable to multiple vulnerabilities. These vulnerabilities include default WPS Pin, authentication based on IP Address, DoS via crafted POST, Path/Directory Traversal, Script injection via DHCP request, and no CSRF Token. These vulnerabilities can be exploited to perform various attacks such as denial of service, unauthorized access, and injection of malicious scripts.
Mitigation:
It is recommended to update the firmware of the HOTBOX router/modem to the latest version to patch these vulnerabilities. Additionally, users should change the default WPS Pin and ensure that strong authentication mechanisms are in place.