Skip to main content
Blog December 19, 2013

Drive By ONT Botnet with IRC C&C

Demonstration of a botnet created purely by using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.

Share this article:

The ONT Alcatel-Lucent I-240W-Q are vulnerable to arbitrary code execution in the administrative web interface and also contain a backdoor which enables remote access to the administrative interface. It is possible to combine these two vulnerabilities to take remote control of these devices.

Authentication is not required for successful exploitation. By simply having the user visit a malicious website through any device connected on the network, the confidentiality of the transmitted information by the device is at risk.


El drive-by exploit consists of three stages:

1. Authenticate using the backdoor account.

 

2. Download the netcat for MIPS and IRC bot.sh
(bot is incomplete - it is just for demonstration purposes)

 

3. Run the files you downloaded.

 


References

Advisory: Arbitrary command execution in Alcatel-Lucent I-240W-Q.

Exploit for Metasploit: alcatel_i240w_exec.rb by Luis Colunga.


This post was originally written by Pedro Joaquin and translated by Roberto Salgado. The originally post in Spanish can be found here.

Subscribe to our Newsletter

Get the latest cybersecurity insights and updates delivered to your inbox.

Related Articles

Discover more cybersecurity insights and solutions to help strengthen your organization's security posture

Image unavailable
Blog October 3, 2023

A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation

In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.

Image unavailable
Blog May 19, 2022

CVE-2022-21404: Another story of developers fixing vulnerabilities unknowingly because of CodeQL

How CodeQL may help reduce false negatives within Open-Source projects. Taking a look into a deserialization vulnerability within Oracle Helidon (CVE-2022-21404).

Image unavailable
Blog September 2, 2021

Cybersecurity in Web Applications - Where to start? Where to improve? Where to learn more?

A list of resources for web application security and a short description of what each resource covers.