Add WANem v2.3 command execution #772

merged 1 commit into from Sep 8, 2012


None yet

3 participants

bcoles commented Sep 8, 2012

Add WANem v2.3 command execution exploit module

  • Remote root
  • Tested on WANem v2.3

WANem v2.3 command execution exploit


Thanks bcoles! Looking into this!

wchen-r7 commented Sep 8, 2012

Nice. Works for me.

@wchen-r7 wchen-r7 merged commit f026591 into rapid7:master Sep 8, 2012

Maybe Rex::Text.uri_encode could be used. I haven't tested


A "echo" injection could be used to test if the application is really vulnerable :)


Is it right even when privileges are acquires after exploitation? Compatible payload doesn't require privileges, but not sure if this "true" is fully correct. Anyway not a big concern :P

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment