Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-5640 PoC — Crestron AirMedia AM-100 目录遍历漏洞

Source
Associated Vulnerability
Title:Crestron AirMedia AM-100 目录遍历漏洞 (CVE-2016-5640)
Description:Crestron AirMedia AM-100是美国Crestron Electronics公司的一款智能家居网关产品。 使用1.2.1及之前版本的固件的Crestron AirMedia AM-100中cgi-bin/rftest.cgi文件中存在目录遍历漏洞。远程攻击者可借助‘ATE_COMMAND’参数中的目录遍历字符‘..’利用该漏洞执行任意命令。
Description
Crestron AirMedia AM-100 RCE (CVE-2016-5640) Metasploit Module
Readme
# CVE-2016-5640
Crestron AirMedia AM-100 RCE (CVE-2016-5640) Metasploit Module

Module for exploiting a Remote Command Injection vulnerability in the wireless diagnostics page for Crestron AirMedia AM-100 devices with a firmware version <1.4.0.13. Commands execute as the account running the service (i.e. usually root). An older exploit I worte a module for because I wanted experience writing checks and using the cmdstager .

All credit for the original exposure and writeup of the vulnerabilities should go to Cylance, I guess: https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2016-05-001.md
File Snapshot

[4.0K] /data/pocs/8df33964ee45d3bddfd47b3a58b42fc0b64ef0a8 ├── [5.5K] crestron_exploit.rb └── [ 615] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.