Drive By ONT Botnet with IRC C&C

Drive By ONT Botnet with IRC C&C

Posted on December 19, 2013 by Roberto Salgado

The ONT Alcatel-Lucent I-240W-Q are vulnerable to arbitrary code execution in the administrative web interface and also contain a backdoor which enables remote access to the administrative interface. It is possible to combine these two vulnerabilities to take remote control of these devices.

Authentication is not required for successful exploitation. By simply having the user visit a malicious website through any device connected on the network, the confidentiality of the transmitted information by the device is at risk.

El drive-by exploit consists of three stages:

1. Authenticate using the backdoor account.


2. Download the netcat for MIPS and IRC
(bot is incomplete - it is just for demonstration purposes)


3. Run the files you downloaded.



Advisory: Arbitrary command execution in Alcatel-Lucent I-240W-Q.

Exploit for Metasploit: alcatel_i240w_exec.rb by Luis Colunga.

This post was originally written by Pedro Joaquin and translated by Roberto Salgado. The originally post in Spanish can be found here.

Latest Blog Entries

Three Non Web-based XSS Injections
In this post guest blogger Alejandro Hernandez (nitr0us) writes about some interesting and fun XSS vectors which are not commonly seen.

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.