Skip to content

CWMP-Capture intercepts & analyzes CWMP (CPE WAN Management Protocol) requests from vulnerable devices. It demonstrates potential vulnerabilities by extracting device info, sending commands & analyzing responses for security testing.

License

Notifications You must be signed in to change notification settings

flintt/CWMP-Server-RCE-Exploit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CWMP-Server-RCE-Exploit

Description

The CWMP-Server-RCE-Exploit is a Python script that demonstrates a Remote Code Execution (RCE) vulnerability in Ruijie Reyee Wireless Routers firmware version B11P204. This vulnerability allows an attacker to execute arbitrary commands on the affected device by exploiting a Man-in-The-Middle (MiTM) attack on the Cloud Web Controller.

Vulnerability Summary

The Ruijie Reyee Cloud Web Controller contains a diagnostic tool that includes a ping check to ensure connectivity to the intended network. However, the input form for IP addresses is not properly validated, enabling an attacker to inject operating system commands. Additionally, the Ruijie Reyee Cloud-based Device makes unencrypted HTTP polling requests to the Ruijie Reyee CWMP server. This vulnerability allows an attacker to set up a fake server using a MiTM attack and send arbitrary commands to the cloud-based device, triggering remote code execution.

Usage

  1. Clone the repository:

    git clone https://github.com/0x1x02/CWMP-Server-RCE-Exploit.git
  2. Navigate to the cloned directory:

    cd CWMP-Server-RCE-Exploit
  3. Install the required dependencies:

    pip install -r requirements.txt
  4. Modify the command variable in the script to specify the command you want to execute on the target device.

  5. Run the exploit script:

    python3 exploit.py
  6. The script will start a fake CWMP server and wait for connections from the target device.

  7. Once the target device connects, the script will intercept the connection, execute the specified command, and display the output.

Disclaimer

This exploit script is intended for educational and research purposes only. Unauthorized use of this script against networks or devices without proper authorization may be illegal. Use it at your own risk.

Credits

  • Exploit Author: 0x1x02 / Mochammad Riyan Firmansyah of SecLab Indonesia
  • Original Advisory: Link

References

About

CWMP-Capture intercepts & analyzes CWMP (CPE WAN Management Protocol) requests from vulnerable devices. It demonstrates potential vulnerabilities by extracting device info, sending commands & analyzing responses for security testing.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%