threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.01k stars 2.31k forks source link

technicolor TD5130 routers ftp and telnet vulnerable with connection error #476

Open zdilto opened 6 years ago

zdilto commented 6 years ago

we have many Technicolor TD5130 routers that users want to update to avoid a certain wps attack but firmware update can only be done via ftp and ftp creds are not known . rsf brute-force are not working with connection errors where i'm running only one instance on the target

Steps that produced the issue for ftp:

1. rsf > use creds/routers/technicolor/ftp_default_creds
2 .rsf (Technicolor Router Default FTP Creds) >  set target  192.168.1.1
[+] target => 192.168.1.1
3. rsf (Technicolor Router Default FTP Creds) > check
[*] Target exposes FTP service
[+] Target is vulnerable
4. rsf (Technicolor Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: 'admin'
[-] 
[-] 
[-] 
[-] Too many connections problems. Quiting...
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.08000922203063965 seconds
[-] Credentials not found

Steps that produced the issue for telnet:

rsf (Technicolor Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet connection error
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet connection error
[-] Telnet connection error
[-] Telnet Authentication Failed - Username: 'admin' Password: 'password'
[-] Telnet Authentication Failed - Username: 'admin' Password: '1234'
[-] Telnet connection error
[-] Telnet connection error
[-] Telnet Authentication Failed - Username: 'Administrator' Password: ''
[*] thread-0 thread is terminated.
[*] Elapsed time: 3.8085930347442627 seconds
[-] Credentials not found

my current Environment

Current Behavior

fail to bruteforce the technicolor router and ends with connections errors even target expose ftp,telnet service and is vulnerable and i only run one attack to the target at a time.

Expected Behavior

try all usernames and passwords on vulnerable technicolor routers successfully we have many Technicolor TD5130 routers that users want to update to avoid a certain wps attack but firmware update can only be done via ftp and ftp creds are not known . rsf brute-force are not working with connection errors where i'm running only one instance on the target

lucyoa commented 5 years ago

I'm unable to reproduce this behaviour. I don't have access to Technicolor TD5130 model though :/ Since the issue is with FTP and Telnet (which are completely two different implementations) the actual problem might be somewhere else.

Have you tried manually authenticate to these devices using "telnet" or "ftp" clients? If so, please paste the output so we could try to figure out whats wrong.

routeropps commented 4 years ago

Hi, I have the same issue, any solution please ?