Path: blob/master/documentation/modules/auxiliary/admin/http/epmp1000_reset_pass.md
27549 views
This module exploits an access control vulnerability in Cambium ePMP device management portal. It requires any one of the following non-admin login credentials - installer/installer, home/home, readonly/readonly - to reset password of other existing user(s) including 'admin'. All versions <=3.5 (current as of today) are affected. The module has been tested on versions 3.0-3.5-RC7.
Verification Steps
Do:
use auxiliary/scanner/http/epmp1000_reset_passDo:
set RHOSTS [IP]Do:
set RPORT [PORT]Do:
set TARGET_USERNAME adminDo:
set NEW_PASSWORD newpassDo:
run