Skip to main content
Blog December 19, 2013

Drive By ONT Botnet with IRC C&C

Demonstration of a botnet created purely by using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.

Share this article:
Drive By ONT Botnet with IRC C&C

The ONT Alcatel-Lucent I-240W-Q are vulnerable to arbitrary code execution in the administrative web interface and also contain a backdoor which enables remote access to the administrative interface. It is possible to combine these two vulnerabilities to take remote control of these devices.

Authentication is not required for successful exploitation. By simply having the user visit a malicious website through any device connected on the network, the confidentiality of the transmitted information by the device is at risk.


El drive-by exploit consists of three stages:

1. Authenticate using the backdoor account.
2. Download the netcat for MIPS and IRC bot.sh
(bot is incomplete - it is just for demonstration purposes)
3. Run the files you downloaded.


References

Advisory: Arbitrary command execution in Alcatel-Lucent I-240W-Q.

Exploit for Metasploit: alcatel_i240w_exec.rb by Luis Colunga.


This post was originally written by Pedro Joaquin and translated by Roberto Salgado. The originally post in Spanish can be found here.

Subscribe to our Newsletter

Get the latest cybersecurity insights and updates delivered to your inbox.

Related Articles

Discover more cybersecurity insights and solutions to help strengthen your organization's security posture

A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation
Blog October 3, 2023

A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation

In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.

Websec DevSecOps Webinar
Blog August 29, 2022

Websec DevSecOps Webinar

Roberto Salgado and Kobalt.io's Miki Fukushima are hosting a free webinar on September 20, 2022 covering why application security matters, the shift to developer-first security, and a practical roadmap for embedding security into DevSecOps.

CVE-2022-21404: Another story of developers fixing vulnerabilities unknowingly because of CodeQL
Blog May 19, 2022

CVE-2022-21404: Another story of developers fixing vulnerabilities unknowingly because of CodeQL

How CodeQL may help reduce false negatives within Open-Source projects. Taking a look into a deserialization vulnerability within Oracle Helidon (CVE-2022-21404).