CVE-2019-1653 Cisco RV320/RV325 Router Unauthenticated Configuration Export Vulnerability
Introduction
Vulnerability CVE-2019-1653 allows export of a configuration file from vulnerable Cisco RV320 and RV325 series routers. This could be exploited to gain administrative access to the router.
Device Identification
Identify the vulnerable devices using shodan query:
http.favicon.hash:-299287097 Apache
Configuration Export
Export the router configuration file by appending /cgi-bin/config.exp to the IP address of the router.
Authentication Bypass
- Open the configuration file and get the username and password hash.
- Start Burpsuite
- In Proxy tab click on Open Browser to open Burp embedded browser.
- Open the router web management url in Burp embedded browser.
- Turn on intercept in Burp proxy.
- Enter the username as in configuration file and any password.
- In the burp proxy Intercept, replace value of password= parameter with hash in configuration file.
- Forward the request and turn off the intercept to login to the router.
Video
Reference:
https://www.redteam-pentesting.de/en/advisories/rt-sa-2019-003/-cisco-rv320-unauthenticated-configuration-export
Comments
Post a Comment