header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Grandstream GXV3275 Vulnerabilities

The Grandstream GXV3275 is an Android-based VoIP phone. Several vulnerabilities were found affecting this device. The device ships with a default root SSH key, which could be used as a backdoor. The SSH interface only provides access to a limited CLI, which can be exploited to break out to a shell. The web interface exposes an undocumented command execution API, and allows unprivileged users to escalate privileges by modifying a cookie on the client side.

Remote file download vulnerability in wordpress plugin wp-ecommerce-shop-styling v2.5

The code in ./wp-ecommerce-shop-styling/includes/download.php doesn't sanitize user input to prevent sensitive system files from being downloaded. An attacker can use the curl command to download the file from the server.

Merethis Centreon – Unauthenticated blind SQLi and Authenticated Remote Command Execution

Centron 2.5.4 is susceptible to multiple vulnerabilities, including unauthenticated blind SQL injection and authenticated remote system command execution. An attacker can exploit CVE-2015-1560 to obtain a valid session_id, which is required to exploit CVE-2015-1561. By exploiting CVE-2015-1561, an attacker can inject commands into the 'ns_id' and 'end' parameters, which are passed to the popen function.

AirLink101 SkyIPCam1620W OS Command Injection

The SkyIPCam1620W Wireless N MPEG4 3GPP Network Camera is vulnerable to an OS Command Injection Vulnerability in the snwrite.cgi binary. The 'mac' parameter is not properly sanitized before being used in a call to system(). The snwrite.cgi binary also contains hard-coded credentials that can be used to authenticate to the device.

Disabling Vulnerability

Symantec EP agent & services can be rendered useless even after globally locking down endpoint protection via a Symantec central management server and enabling globally managed password protection controls. Tested successfully on Windows 7 SP1 result may vary OS to OS.

Cradlepoint MBR LFI

I found a local file include with root level permissions on cradlepoint routers. So far looks like it works on MBR1400 and MBR1200 routers, though others could be affected. I say it is with root level because it can read /etc/passwd and there is no 'x' indicating the hash is stored in the /etc/shadow file. Therefore the root hash is included in this file. To access the root hash on Cradlepoint MBRs simply: curl http://192.168.1.1/../../../../../../../../../../../../etc/passwd

Adobe Flash Player ByteArray Use After Free

This module exploits an use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data leak, was described as an Use After Free while handling ByteArray objects. This module has been tested successfully on: Windows XP, Chrome 43 and Adobe Flash 18.0.0.194, Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.194, Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.194, Windows 8.1 (32-bit), Firefox and Adobe Flash 18.0.0.194, Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.468.

Dlink Wireless Router Password File Access Exploit (Local File Inclusion)

The router suffers from an authenticated file inclusion vulnerability (LFI) when input passed thru the 'getpage' parameter to 'webproc' script is not properly verified before being used to include files. This can be exploited to include files from local resources.

CSRF & XSS

No CSRF token exists when making calls to various SQL operations, therefore we can get user to drop the whole database tables if they click on our malicious link and table is known. There are three XSS vulnerabilities, first is use of 'PHP_SELF', second is unsanitized parameter for SQL statement when calling drop table method and third is an unsanitized 'table' parameter. If we can control the 'PHP_SELF' variable we can inject our XSS payload into the 'PAGE' constant.

Recent Exploits: