dirtyfilthy / gxv3175-remote-code-exec

Remote code execution for Grandstream GXV3175 VOIP phone.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Remote code execution for Grandstream GXV3175 VOIP phone.

=== INSTALLATION ===

copy the files to the same directory structure under the metasploit top level dir

=== USE ===

in msfconsole


use exploits/linux/http/grandstream_gxv3175_cmd_exec

set RHOST 192.168.0.1

set USERNAME & PASSWORD if required (defaults set to admin / admin)

run


Also comes with a (default) custom payload to spawn a busybox shell on port 4444

About

Remote code execution for Grandstream GXV3175 VOIP phone.


Languages

Language:Ruby 100.0%