Skip to content

Commit 0c12292

Browse files
author
David Davidson
authored
Create README.md
1 parent 8543d3a commit 0c12292

File tree

1 file changed

+21
-0
lines changed

1 file changed

+21
-0
lines changed

wipgpwn/README.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
# Remote Root Exploit for WePresent WiPG 1000, 1500, 2000 Devices.
2+
This is a trivial remote root exploit that targets the WePresent WiPG 1000, 1500, and 2000 devices. It implements the command injection vulnerability (preauth) mentioned in [this advisory](https://www.redguard.ch/advisories/wepresent-wipg1000.txt) to get a root shell on the device using the built in netcat executable present.
3+
4+
## Usage
5+
Just run the exploit with the URL of the device, your connectback host, and your connectback port.
6+
7+
You can get a TTY by doing the following:
8+
9+
First, run `stty -echo raw; nc -l -v -p 6666 ; stty sane` to start a listener.
10+
Next, when you get a shell, it won't work properly. So type in "script /dev/null" and hit CTRL+J.
11+
Next, type "reset" and you SHOULD have a TTY.
12+
If all else fails just use the shitty netcat shell to stage a better payload that does deliver a TTY.
13+
14+
## Screenshots of Use/Example Use
15+
Here we have a screenshot of it working.
16+
![lol](https://raw.githubusercontent.com/XiphosResearch/exploits/master/wipgpwn/sanitizedexploit.png)
17+
18+
## Licence
19+
Licenced under the [WTFPL][wtfpl]
20+
21+
[wtfpl]: http://www.wtfpl.net/

0 commit comments

Comments
 (0)