Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for GXV3140 models and ARCH_CMD busybox telnetd payload #16125

Merged

Conversation

bcoles
Copy link
Contributor

@bcoles bcoles commented Jan 29, 2022

While the command injection vulnerability is exploitable on both GXV3175 and GXV3140 models, sadly Metasploit ARMLE payloads segfault on GXV3140.

This PR adds support an ARCH_CMD target so as to leverage BusyBox telnetd on these devices instead. The telnetd payload works on both models.

@bcoles bcoles force-pushed the grandstream_gxv31xx_settimezone_unauth_cmd_exec branch from e39709e to feebf25 Compare January 29, 2022 19:40
@space-r7 space-r7 self-assigned this Feb 8, 2022
@space-r7
Copy link
Contributor

space-r7 commented Feb 8, 2022

LGTM

@space-r7 space-r7 merged commit bed067d into rapid7:master Feb 8, 2022
@space-r7 space-r7 added the rn-modules release notes for new or majorly enhanced modules label Feb 8, 2022
@space-r7
Copy link
Contributor

space-r7 commented Feb 8, 2022

Release Notes

This module can exploit GXV3140 models now that an ARCH_CMD target has been added.

@bcoles bcoles deleted the grandstream_gxv31xx_settimezone_unauth_cmd_exec branch February 8, 2022 18:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement module rn-modules release notes for new or majorly enhanced modules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants