Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/linux/telnet/netgear_telnetenable.md
Views: 11789
Introduction
Several models of Netgear devices have a hidden telnet daemon that can be enabled for remote LAN users by sending a 'magic packet' to the device. Upon successful connect, a root shell should be presented to the user.
There are many devices which contain this daemon, for a full list see OpenWrt.
This module has been successfully tested against:
AC1450 - unknown older firmware (TCP)
AC1450 - latest firmware: V1.0.0.36_10.0.17 (UDP)
N300 WNR2000 v3 - firmware: V1.1.2.10 (TCP)
Setup
A MAC address is required for exploitation. To determine the MAC address of the device:
Ping the device to force an ARP lookup:
ping -c 1 [IP]
Get the MAC:
arp -an [IP]
If you are the root user, you can skip this step. ARP will be leveraged to find the MAC address.
Targets
0 (Automatic)
Detect if a device listens on TCP or UDP.
1 (TCP)
Older devices usually listen on TCP.
2 (UDP)
Newer devices usually listen on UDP.
Options
MAC
Set this to the MAC address of the device. You can use ping
and arp
to find it.
You can leave this blank if you're root.
USERNAME
If this is an older device, it'll take the value of super_username
in nvram
, which is usually unchanged from Gearguy
.
If this is a newer device, it'll take the web UI username, which is usually unchanged from admin
.
You can leave this blank to use the default username.
PASSWORD
If this is an older device, it'll take the value of super_passwd
in nvram
, which is usually unchanged from Geardog
.
If this is a newer device, it'll take the web UI password, which is usually unchanged from password
.
You can leave this blank to use the default password.
Exploitation
Make sure you have a vulnerable device
Start metasploit
use exploit/linux/telnet/netgear_telnetenable
set rhost [IP]
set mac [MAC Address]
if not running as rootexploit
Enjoy a root shell!
Usage
AC1450
As a normal user:
As root: