Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Sep 16, 2021
1 parent 12af64c commit b7fd61c
Showing 1 changed file with 62 additions and 0 deletions.
62 changes: 62 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -59107,6 +59107,68 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/geutebruck_instantrec_bof": {
"name": "Geutebruck instantrec Remote Command Execution",
"fullname": "exploit/linux/http/geutebruck_instantrec_bof",
"aliases": [

],
"rank": 600,
"disclosure_date": "2021-07-08",
"type": "exploit",
"author": [
"Titouan Lazard - RandoriSec",
"Ibrahim Ayadhi - RandoriSec"
],
"description": "This module exploits a buffer overflow within the 'action'\n parameter of the /uapi-cgi/instantrec.cgi page of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,\n ETHC-22xx, and EWPC-22xx devices running firmware versions == 1.12.0.27 as well as firmware\n versions 1.12.13.2 and 1.12.14.5.\n Successful exploitation results in remote code execution as the root user.",
"references": [
"CVE-2021-33549",
"URL-https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/",
"URL-http://geutebruck.com",
"URL-https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03"
],
"platform": "Linux,Unix",
"arch": "armle",
"rport": 80,
"autofilter_ports": [
80,
8080,
443,
8000,
8888,
8880,
8008,
3000,
8443
],
"autofilter_services": [
"http",
"https"
],
"targets": [
"Automatic Target"
],
"mod_time": "2021-09-16 08:22:57 +0000",
"path": "/modules/exploits/linux/http/geutebruck_instantrec_bof.rb",
"is_install_path": true,
"ref_name": "linux/http/geutebruck_instantrec_bof",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"CRASH_SAFE"
],
"Reliability": [
"REPEATABLE_SESSION"
],
"SideEffects": [
"ARTIFACTS_ON_DISK"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_linux/http/geutebruck_testaction_exec": {
"name": "Geutebruck testaction.cgi Remote Command Execution",
"fullname": "exploit/linux/http/geutebruck_testaction_exec",
Expand Down

0 comments on commit b7fd61c

Please sign in to comment.