Rapid7 Vulnerability & Exploit Database

Netgear PNPX_GetShareFolderList Authentication Bypass

Back to Search

Netgear PNPX_GetShareFolderList Authentication Bypass

Disclosed
09/06/2021
Created
09/25/2021

Description

This module targets an authentication bypass vulnerability in the mini_http binary of several Netgear Routers running firmware versions prior to 1.2.0.88, 1.0.1.80, 1.1.0.110, and 1.1.0.84. The vulnerability allows unauthenticated attackers to reveal the password for the admin user that is used to log into the router's administrative portal, in plaintext. Once the password has been been obtained, the exploit enables telnet on the target router and then utiltizes the auxiliary/scanner/telnet/telnet_login module to log into the router using the stolen credentials of the admin user. This will result in the attacker obtaining a new telnet session as the "root" user. This vulnerability was discovered and exploited by an independent security researcher who reported it to SSD.

Author(s)

  • Unknown
  • Grant Willcox

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/http/netgear_pnpx_getsharefolderlist_auth_bypass
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > show actions
    ...actions...
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > set ACTION < action-name >
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > show options
    ...show and set options...
msf auxiliary(netgear_pnpx_getsharefolderlist_auth_bypass) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;