Drive By ONT Botnet with IRC C&C

Drive By ONT Botnet with IRC C&C

Posted on December 19, 2013 by Roberto Salgado

The ONT Alcatel-Lucent I-240W-Q are vulnerable to arbitrary code execution in the administrative web interface and also contain a backdoor which enables remote access to the administrative interface. It is possible to combine these two vulnerabilities to take remote control of these devices.

Authentication is not required for successful exploitation. By simply having the user visit a malicious website through any device connected on the network, the confidentiality of the transmitted information by the device is at risk.

El drive-by exploit consists of three stages:

1. Authenticate using the backdoor account.


2. Download the netcat for MIPS and IRC
(bot is incomplete - it is just for demonstration purposes)


3. Run the files you downloaded.



Advisory: Arbitrary command execution in Alcatel-Lucent I-240W-Q.

Exploit for Metasploit: alcatel_i240w_exec.rb by Luis Colunga.

This post was originally written by Pedro Joaquin and translated by Roberto Salgado. The originally post in Spanish can be found here.

Latest Blog Entries

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.