module

Geutebruck instantrec Remote Command Execution

Disclosed
07/08/2021
Created
09/20/2021

Description

This module exploits a buffer overflow within the 'action'
parameter of the /uapi-cgi/instantrec.cgi page of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,
ETHC-22xx, and EWPC-22xx devices running firmware versions == 1.12.0.27 as well as firmware
versions 1.12.13.2 and 1.12.14.5.
Successful exploitation results in remote code execution as the root user.

Authors

Titouan Lazard - RandoriSecIbrahim Ayadhi - RandoriSec

Platform

Linux,Unix

Architectures

armle

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

    msf > use exploit/linux/http/geutebruck_instantrec_bof
    msf /(f) > show actions
        ...actions...
    msf /(f) > set ACTION < action-name >
    msf /(f) > show options
        ...show and set options...
    msf /(f) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.