Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save nu11secur1ty/174bd100f7fa745ef2c5b182fea2bec4 to your computer and use it in GitHub Desktop.
Save nu11secur1ty/174bd100f7fa745ef2c5b182fea2bec4 to your computer and use it in GitHub Desktop.
During an audit the Mikrotik RouterOS sshd (ROSSSH) has been identified to have a remote previous to authentication heap corruption in its sshd component.
Exploitation of this vulnerability will allow full access to the router device.
This analysis describes the bug and includes a way to get developer access to recent versions of Mikrotik RouterOS
using the /etc/devel-login file. This is done by forging a modified NPK file using a correct signature and logging
into the device with username ‘devel’ and the password of the administrator. This will drop into a busybox shell for
further researching the sshd vulnerability using gdb and strace tools that have been compiled for the Mikrotik busybox
platform.
Shodanhq.com shows >290.000 entries for the ROSSSH search term.
The 50 megs Mikrotik package including the all research items can be downloaded here:
http://www.farlight.org/mikropackage.zip
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/28056.zip
# Read more
https://www.exploit-db.com/exploits/28056/
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment