After discovering a couple vulnerabilities in the Asus RT56U prior, I decided to check out the latest firmware and hunt around for a few more.
I was running 18.104.22.168.342, which happens to be one version behind the latest (22.214.171.124.360), so I did a sweep of both. I enabled telnet on the router and hunted around, which led me to an unlinked page, Main_Analysis_Content.asp. This page hosts a slew of diagnostic tools, including the ability to ping network systems. See where this is going?
Pretty trivial, and each command, ping, nslookup, and traceroute, is vulnerable. The system is running an HTTP web server that serves up ASP pages, so we could wget and deploy a reverse ASP shell or set up a netcat listener.
I then took a look at the latest firmware, which touts the following changes:
ASUS RT-N56U Firmware Version 126.96.36.199.360
For iOS user, please upgrade app to 1.02.78 or above
(for more information, please refer to http://event.asus.com/2012/nw/aicloud/index.htm)
2. Network tools in Advanced setting
3. WOL user interface
4. H.323 and SIP passthrough can be disabled in Advanced Settings --> WAN -->NAT Passthrough
5. Click the device name and lookup the manufacturer information
6. Change the DHCP query frequency in Advanced settings-->WAN-->Internet connection to resolve the ISP compatibility issue.
So it looks like the tools were added in the .342 (or earlier) firmware, but not actually linked until the .360 release. I then flashed over the firmware to take a look at any changes. It appeared they added a Network Tools section which, of course, allows us to:
It’s kind of ridiculous that we can hit /etc/shadow with this.
As an aside, I thought about what sort of files might be accessible without authenticating to the web server. Seeing as I had access to enumerate the file system, I constructed a listing of every file in the web server’s root. The code can be seen below:
import urllib, urllib2
files = 
with open('files_rt.txt', 'r') as f:
files = [x.strip() for x in f.readlines()]
print '[!] Built %d files to test...'%len(files)
files = get_files()
open_files = 
for f in files:
url = 'http://192.168.1.1/'+f
data = urllib2.urlopen(url).read()
except urllib2.HTTPError as e:
print '[!] %d exposed files'%len(open_files)
for f in open_files: print '\t[!] %s'%f
if __name__ == "__main__":
A majority of the files are pretty useless/uninteresting, such as the css/jpg/png files, but a couple of the ASP files have some interesting information. Nologin.asp lets us know every address the DHCP server has leased out, as well as the IP of the currently logged in administrator. get_webdavInfo.asp gives us a bunch of great info, including the firmware version, DDNS information, mode of operation, and more.
The only really interesting page to me is Nologin.asp. This gives us the currently logged in administrator; so, if we’re on the local network, we can generate a short script that periodically pings the router and alerts us when an admin logs in. We can then ARPP the administrator and hijack the password; this works because the router’s web server doesn’t do any session management, it simply uses basic HTTP auth to send the base64’d password.
Now we know where the administrator is logged in. We can now ARPP the host and hijack the password. It is unnecessary for the administrator to actually be doing anything, because conveniently the client’s browser sends out an ajax request to /ajax_status.asp quite often, complete with authentication credentials. Using zarp, a network attack tool designed by yours truly, we can ARPP the admin and set up a password sniffer: