mirror of
https://github.com/EFForg/rayhunter.git
synced 2026-04-26 07:29:59 -07:00
There is a shell injection vulnerability after all, so we can just
launch a remote shell, tplink-style. Except there's no telnetd on this
device so we need to use netcat.
This was found in the goahead binary on the device using Ghidra. The
decompiled code for this endpoint looks like this:
```c
void FUN_0003c614(int param_1)
{
int iVar1;
undefined4 uVar2;
int local_160;
undefined1 auStack_15c [64];
char acStack_11c [256];
int local_1c;
local_1c = __stack_chk_guard;
if (param_1 == 0) {
error("input parameter is NULL!");
uVar2 = 0x66;
goto LAB_0003c808;
}
iVar1 = websGetJsonItemValue(param_1,"password",10,auStack_15c,0x40);
if (iVar1 != 0) {
iVar1 = get_log_level_something();
if (1 < iVar1) {
some_logging_func(2,"modifying root password(%s)...",auStack_15c);
}
iVar1 = sprintf(acStack_11c,"echo root:\"%s\"|chpasswd",auStack_15c);
acStack_11c[iVar1] = '\0';
system(acStack_11c);
}
```
Usage is `./installer orbic-network`, as an alternative to `./installer
orbic`. It should work on Windows without any kind of drivers.
This installer also works on the Moxee device.
24 lines
517 B
Markdown
24 lines
517 B
Markdown
# Moxee Hotspot
|
|
|
|
Supported in Rayhunter since version 0.6.0.
|
|
|
|
The [Moxee Hotspot](https://www.moxee.com/hotspot) is a device very similar to
|
|
the Orbic RC400L. It seems to be primarily for the US market.
|
|
|
|
## Installation
|
|
|
|
Connect to the hotspot's network using WiFi or USB tethering and run:
|
|
|
|
```sh
|
|
./installer orbic-network
|
|
```
|
|
|
|
The installation will ask you to log into the admin UI using a custom URL. The
|
|
password for that is under the battery.
|
|
|
|
## Obtaining a shell
|
|
|
|
```sh
|
|
./installer util orbic-start-telnet
|
|
```
|