Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-6319 PoC — LG webOS 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:LG webOS 操作系统命令注入漏洞 (CVE-2023-6319)
Description:LG webOS是韩国乐金(LG)公司的一个基于 Linux 内核的智能电视操作系统。 LG webOS 存在操作系统命令注入漏洞,该漏洞源于com.webos.service.attachedstoragemanager服务的getAudioMetadata方法中存在操作系统命令注入漏洞。受影响的产品和版本:webOS 4.9.7至5.30.40版本,5.5.0至04.50.51版本,6.3.3-442 (kisscurl-kinglake)至03.36.50版本,7.3.1-43 (mullet-me
Description
CVE-2023-6319 proof of concept
Readme
# Root my webOS TV

A simple python script that starts a telnet server on vulnerable webOS devices as `root`.

## Supported TVs

- **webOS 4.9.7 - 5.30.40** (model **LG43UM7000PLA**)
- **webOS 5.5.0 - 04.50.51** (model **OLED55CXPUA**)
- **webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50** (model **OLED48C1PUB**)
- **webOS 7.3.1-43 (mullet-mebin) - 03.33.85** (model **OLED55A23LA**)

## Installation

1. Install Python 3 from https://www.python.org/downloads/ or using a package manager
2. Clone this repo
3. Install dependencies using `pip install -r requirements.txt`
4. Run the script using `python rootmytv.py`
5. Follow on-screen instructions

If the script was successful, a telnet server with root access will be created on the TV with port 23. You can use any software to access it, for example Putty on Windows.

A more in-depth tutorial can be found on my blog here: https://blog.illixion.com/2024/04/root-lg-webos-tv/

## Known errors

- `500 application error, not allowed to call com.webos.service.downloadmanager/download`: your TV is patched against this vulnerability and is thus incompatible
- `websockets.exceptions.InvalidMessage: did not receive a valid HTTP response`: you are using an old version of the script, please redownload all files, reinstall the requirements and try again


## References

This exploit uses the following CVE: https://www.cve.org/CVERecord?id=CVE-2023-6319
File Snapshot

[4.0K] /data/pocs/a2443fc86ac8802d1afae1256aa9356fd9b551d0 ├── [1.0K] LICENSE ├── [1.4K] README.md ├── [ 155] requirements.txt └── [4.3K] rootmytv.py 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.