Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fritz!Box exploit: Added Big Endianess, improved check()-Function #3207

Merged
merged 1 commit into from
Apr 10, 2014

Conversation

7a69
Copy link

@7a69 7a69 commented Apr 8, 2014

Some Fritz!Box devices also run in Big Endianess mode (e.g. Version 7360). However, since
"uname -a" always returns "mips" and the "file"-command is not
available, autodetection is not an easy task.

The check()-function now checks, whether the device is really
vulnerable.

Furthermore, it's possible to send 92 bytes.

Some Fritz!Box devices also run in Big Endianess mode. However, since
"uname -a" always returns "mips" and the "file"-command is not
available, autodetection is not an easy task.

The check()-function now checks, whether the device is really
vulnerable.

Furthemore, it's possible to send 92 bytes.
@m-1-k-3
Copy link
Contributor

m-1-k-3 commented Apr 9, 2014

@7a69 thanks for your input ... I have tested it on my box and it works perfect!

@jvazquez-r7
Copy link
Contributor

coolio, thanks @m-1-k-3 for testing, just reviewing and landing!

@jvazquez-r7 jvazquez-r7 merged commit 8dce80f into rapid7:master Apr 10, 2014
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants