Broken, Abandoned, and Forgotten Code, Part 13

Posted by Zach C on Oct 08

Part 13 (the penultimate installment) of Broken, Abandoned, and
Forgotten Code is up. In this first of two parts covering post
exploitation, we cover how to customize the stage 1 firmware image the
exploit will flash onto the target. It is the job of this minimized
firmware image to bootstrap a fully functional, trojanized stage 2
firmware onto the Netgear R6200.

Here’s a link to part 13:…

CVE-2015-5649

Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 mishandles authentication requests, which allows remote authenticated users to conduct LDAP injection attacks, and consequently bypass intended login restrictions or obtain sensitive information, by leveraging certain group-administration privileges.

CVE-2015-6310

The REST interface in Cisco Unified Communications Manager IM and Presence Service 11.5(1) allows remote attackers to cause a denial of service (SIP proxy service restart) via a crafted HTTP request, aka Bug ID CSCuw31632.

CVE-2015-6311

Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0), 7.3(101.0), and 7.4(1.19) allow remote attackers to cause a denial of service (device outage) by sending malformed 802.11i management data to a managed access point, aka Bug ID CSCub65236.