vendor:
Router 7700NR4
by:
R-73eN
9,8
CVSS
HIGH
Remote Root Command Execution
287
CWE
Product Name: Router 7700NR4
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Billion Router 7700NR4
2016
Billion Router 7700NR4 Remote Root Command Execution
This router is a widely used here in Albania. It is given by a telecom provider to the home and bussiness users. The problem is that this router has hardcoded credentials which "can not be changed" by a normal user. Using these credentials we don't have to much access but the lack of authentication security we can download the backup and get the admin password. Using that password we can login to telnet server and use a shell escape to get a reverse root connection.
Mitigation:
The only fix is hacking your router with this exploit, changing the credentials and disabling all the other services using iptables.