Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Comtrend ADSL - Remote Code Execution

By kannthu

High
Vidoc logoVidoc Module
#router#exposure#iot#rce#edb
Description

What is "Comtrend ADSL - Remote Code Execution?"

The "Comtrend ADSL - Remote Code Execution" module is designed to detect a vulnerability in the Comtrend ADSL CT-5367 C01_R12 router. This vulnerability allows remote attackers to execute arbitrary commands through the telnet interface. The severity of this vulnerability is classified as high.

This module was authored by geeknik.

Impact

If exploited, this vulnerability can allow unauthorized users to execute arbitrary commands on the affected router. This can lead to unauthorized access, data theft, or further compromise of the network.

How the module works?

The module sends a GET request to the "/password.cgi" endpoint of the Comtrend ADSL router. It then applies matching conditions to determine if the vulnerability is present.

The matching conditions used by the module are as follows:

- The response status code must be 200. - The response body must contain the following strings: "pwdAdmin =", "pwdSupport =", and "pwdUser =".

If all the matching conditions are met, the module reports the vulnerability.

Example HTTP request:

GET /password.cgi

Note: The actual JSON definitions of the module are not shown here for simplicity.

For more information, refer to the official reference.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/password.cgi
Matching conditions
status: 200and
word: pwdAdmin =, pwdSupport =, pwdUser =
Passive global matcher
No matching conditions.
On match action
Report vulnerability