Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9476 PoC — Cisco DPC3939和Arris TG1682G 信息泄露漏洞

Source
Associated Vulnerability
Title:Cisco DPC3939和Arris TG1682G 信息泄露漏洞 (CVE-2017-9476)
Description:Cisco DPC3939(XB3)是美国思科(Cisco)公司的一款无线家庭语音网关产品。Arris TG1682G是美国Arris集团公司的一款Modem(调制解调器)路由器一体机设备。 Cisco DPC3939和Arris TG1682G中存在安全漏洞。远程攻击者可利用该漏洞确定隐藏的SSID和密码。以下产品和版本受到影响:使用dpc3939-P20-18-v303r20421733-160420a-CMCST版本固件的Cisco DPC3939,使用dpc3939-P20-18-v303r204
Description
Hidden AP with Deterministic Credentials
Readme
# CVE-2017-9476

Hidden AP with Deterministic Credentials.

## Compiling

```
    cc xhscmmac2psk.c -o xhscmmac2psk
```

## Usage

```
    ./xhscmmac2psk <valid Cable Modem mac address>
```

The algorithm has been also added to [PSKracker](https://github.com/soxrok2212/PSKracker/commit/f099690ec5fdeee74b6e8ded80812dac5a415557).

## References

- [CVE-2017-9476](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9476)
- [Bastille-18.home-security-wifi-network.txt](https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-18.home-security-wifi-network.txt)
- [DEFCON 25 whitepaper](https://github.com/BastilleResearch/CableTap/blob/master/doc/pdf/DEFCON-25-Marc-Newlin-CableTap-White-Paper.pdf)
- [DEFCON 25 slides](https://github.com/BastilleResearch/CableTap/blob/master/doc/pdf/DEFCON-25-Marc-Newlin-CableTap-Slides.pdf)
File Snapshot

[4.0K] /data/pocs/74f3f93097d7818243f962c19da9e48b9828ba96 ├── [ 854] README.md └── [4.8K] xhscmmac2psk.c 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.