Skip to content

Wavlink router remote code execution exploit code and patch code. (wavlink n300)

Notifications You must be signed in to change notification settings

Hack-Hut/WLN300-Exploit-and-patch

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

WLN300-Exploit-and-patch

Wavlink router remote code execution exploit code and patch code. (wavlink n300). This exploit requiers no authentication other than being on the same sub network. The exploit will give RCE with root access.

How to use

python3 Exploit.py 192.168.0.1

Disclouser date

04/06/2018

Requirements

pip install requests python version 3

How does the exploit works?

The router has a hidden developer console that can be accesssed over port 80, the program will make requests to emulate a shell and allow remote code execution on the target

How does the patch work?

The patch works by exploiting the system and removing the vulnerable file to prevent further exploitation

Warrenty

Use this code at your own risk, this code comes with no warrenty. Never run this code against a wavlink router that you do not own, even the patch.

Contribution

Feel free to contribute as my error testing is not comprehensive also I have no tested the patch (as this would fix my router and I want to be able to play with other bin files etc on the router)

About

Wavlink router remote code execution exploit code and patch code. (wavlink n300)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages