Wednesday, July 31, 2013

Axis Camera M1011 Remote Code Execution Exploit

In January 2013, Rapid7 published a great paper describing several vulnerabilities in the most common UPnP libraries.
Six months later, many devices based on these libraries have not been updated and are still exposed.

For example, the Axis M1011 camera contains a vulnerable version of libupnp, which can lead to arbitrary remote code execution without authentication.

You can find the corresponding metasploit module on my Github.

To check whether your devices are vulnerable to known UPnP attacks, you can use ScanNow tool by Rapid7.

3 comments:

  1. With the support of EDGE and GPRS the data transfer and data download has become very fast. There are many latest models introduced in the market by Lava, Motorola and Apple.
    xiaomi mi6

    ReplyDelete
  2. This is an excellent idea for photo opportunities when you will "want it all." However, on vacation you will generally want to streamline what you carry, paring things down to the essentials.click here

    ReplyDelete