Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Comtrend CT 5361T Password Disclosure vulnerability #3

Merged
merged 2 commits into from
Apr 5, 2016

Conversation

HassenPy
Copy link
Contributor

@HassenPy HassenPy commented Apr 5, 2016

same as asmax/ar_1004g_password_disclosure but with b64decode
full details:
https://packetstormsecurity.com/files/126129/Comtrend-CT-5361T-Password-Disclosure.html

@lucyoa
Copy link
Contributor

lucyoa commented Apr 5, 2016

Nice @HassenPy . We only need two little changes:

  1. Exploit path should be as follow:
    modules/exploits//<model_vulnerability>

In this case your exploit should be located at:
modules/exploits/comtrend/ct_5361t_password_disclosure.py

  1. Information at info are shown under "show info" command and they are very generic for every exploit. You provided additional information that currently are not supported by the routersploit framework:
    'Software Version': 'A111-312SSG-T02_R01',
    'Wireless Driver Version': '4.150.10.15.cpe2.2',
    Could you merge that information to "description" or "targets" info?

@HassenPy
Copy link
Contributor Author

HassenPy commented Apr 5, 2016

github drove me crazy for this one, i did the changes then pushed to upstream, then it took an hour to show on the site lol

@lucyoa lucyoa merged commit 4fc0d9b into threat9:master Apr 5, 2016
@lucyoa
Copy link
Contributor

lucyoa commented Apr 5, 2016

Good job. Happy to merge :)

lucyoa pushed a commit that referenced this pull request Apr 28, 2016
@fwkz fwkz added the module label May 7, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants