Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-6558 PoC — iball Baton 150M Wireless-N ADSI.2+路由器安全漏洞

Source
Associated Vulnerability
Title:iball Baton 150M Wireless-N ADSI.2+路由器安全漏洞 (CVE-2017-6558)
Description:iball Baton 150M Wireless-N ADSI.2+是印度iBall公司的一款无线路由器。 iball Baton 150M Wireless-N ADSI.2+路由器中存在安全绕过漏洞。远程攻击者可通过读取password.cgi文件中的HTML源代码利用该漏洞查看和更改管理员路由器设置。使用以下固件和硬件的设备受到影响:1.2.6 build 110401 Rel.47776n版本的固件;iB-WRA150N v1 00000001版本的硬件。
Description
POC checks for CVE-2017-6558, CVE-2017-14243 & CVE-2017-14244
Readme
# iBall & UTStar Authentication Bypass & Information Disclosure Vulnerabilities
POC checks for CVE-2017-6558, CVE-2017-14243 & CVE-2017-14244

# Screenshots
![POC 1](sc1.png)
![POC 2](sc2.png)

# References
1. https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broadband-modem-authentication-bypass
2. https://www.exploit-db.com/exploits/42739/
3. https://www.exploit-db.com/exploits/42740/
4. https://www.youtube.com/watch?v=8GZg1IuSfCs
File Snapshot

[4.0K] /data/pocs/63511332795a3e74224f571c5aa983aab6201787 ├── [2.6K] iball-utstar.py ├── [ 468] README.md ├── [ 19K] sc1.png └── [ 15K] sc2.png 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.