Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cdata backdoor wordlist #13848

Merged
merged 2 commits into from
Jul 16, 2020
Merged

Conversation

@gwillcox-r7
Copy link
Contributor

Thanks for the contribution @0x44434241! This looks good to me after some quick testing so I'm going to go ahead and land this in so long :)

@gwillcox-r7 gwillcox-r7 merged commit 7d36532 into rapid7:master Jul 16, 2020
@gwillcox-r7
Copy link
Contributor

gwillcox-r7 commented Jul 16, 2020

Original Release Notes

This PR adds in a new wordlist, data/wordlists/telnet_cdata_ftth_backdoor_userpass.txt that adds in 4 backdoor admin credentials that were found to be hardcoded into the Telnet component of CDATA OLTs and which were disclosed on July 7th 2020 by @PierreKimSec on his blog at https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html. Users can use this wordlist along with the auxiliary/scanner/telnet/telnet_login.rb module to scan for vulnerable CDATA OLT devices on their network.

@pbarry-r7 pbarry-r7 added the rn-enhancement release notes enhancement label Jul 21, 2020
@pbarry-r7
Copy link
Contributor

pbarry-r7 commented Jul 22, 2020

Release Notes

A new wordlist has been added as data/wordlists/telnet_cdata_ftth_backdoor_userpass.txt, containing four backdoor admin credentials that were found to be hardcoded into the Telnet component of CDATA OLTs. This wordlist can be used in conjunction with the auxiliary/scanner/telnet/telnet_login module to scan for vulnerable CDATA OLT devices on a network.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
easy enhancement rn-enhancement release notes enhancement
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants