Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-40859 PoC — Auerswald Compact 系列安全漏洞

Source
Associated Vulnerability
Title:Auerswald Compact 系列安全漏洞 (CVE-2021-40859)
Description:Auerswald Compact 系列是德国Auerswald公司的一种 Ict 解决方案。 Auerswald Compact 系列 存在安全漏洞,该漏洞源于该产品的固件中发现了几个后门。这些后门允许能够访问基于 Web 的管理应用程序的攻击者对设备进行完全管理访问。8.0B 及以下版本受到影响。
Description
Auerswald COMpact 8.0B Backdoors exploit
Readme
# CVE-2021-40859
Auerswald COMpact 8.0B Backdoors exploit


# About
Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow attackers with access to the web based management application full administrative access to the device.

# Product Details
Product: COMpact 3000 ISDN, COMpact 3000 analog, COMpact 3000 VoIP, COMpact 4000, COMpact 5000(R), COMpact 5200(R), COMpact 5500R, COMmander 6000(R)(RX), COMpact 5010 VoIP, COMpact 5020 VoIP, COMmander Business(19"), COMmander Basic.2(19").

Affected Versions: <= 8.0B (COMpact 4000, COMpact 5000(R), COMpact 5200(R), COMpact 5500R, COMmander 6000(R)(RX)), <= 4.0S (COMpact 3000 ISDN, COMpact 3000 analog, COMpact 3000 VoIP).

Fixed Versions: 8.2B, 4.0T.

Vulnerability Type: Backdoor.

Security Risk: high.


## Installation


```bash
pip3 install requests lxml BeautifulSoup pandas 
```


## Usage
```python
python3 flagger.py http(s)://ip
```
```python
python3 CVE-2021-40859.py ip:port
```
flagger
![Alt text](https://github.com/dorkerdevil/CVE-2021-40859/blob/main/sup.png "Flagger")

flagger does checks based on the vulnerable product list and if matches then it flags it as vulnerable and for further confirmation 
Please run CVE-2021-40859.py .

## Note

This exploit code checks if your Auerswald COMpact server is accessible using the backdoors.

## Developer
[D0rkerDevil](https://twitter.com/D0rkerDevil)
[wabaf3t](https://twitter.com/wabafet1)

## References
https://packetstormsecurity.com/files/165168/Auerswald-COMpact-8.0B-Backdoors.html

https://www.redteam-pentesting.de/advisories/rt-sa-2021-007

## License
[MIT](https://choosealicense.com/licenses/mit/)

File Snapshot

[4.0K] /data/pocs/df07280d9e58bc72044272b620e136af98359a72 ├── [2.9K] CVE-2021-40859.py ├── [ 830] flagger.py ├── [1.6K] README.md └── [ 25K] sup.png 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.