COVR 3902 1.01B0 Hardcoded Credentials ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on September 5th, 2020 📆 | 3058 Views ⚑

0

COVR 3902 1.01B0 Hardcoded Credentials ≈ Packet Storm

*Title*: Telnet Hardcoded Credentials

*Summary*: The latest versions of the firmware have hardcoded default
credentials that can be exploited by an unauthenticated attacker to gain
privileged access to the firmware and to extract sensitive data

*Affected Firmware:* COVR-3902_REVA_ROUTER_FIRMWARE_v1.01B0

*CVE:* CVE-2018-20432

*Proof of Concept: *
Step 1: “cat ./etc/init0.d/S80telnetd.sh” to get a username
Step 2: “cat ./etc/config/image_sign” to get a password.

Username: Alphanetworks
Password: wrgac61_dlink.2015_dir883

———-
Cheers !!!
Team CSW Research Lab

Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...