Skip to content

KylVGoi/cve-2019-1663

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

26 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸš€ Exploitation of CVE-2019-1663

🧩 Introduction

  • This repository documents the exploitation of CVE-2019-1663, a critical remote code execution (RCE) vulnerability affecting Cisco RV110W, RV130W, and RV215W Wireless-N VPN routers.

  • Due to insufficient input validation within the web management interface, an unauthenticated attacker can execute arbitrary commands with elevated privileges on the device.

  • This project was conducted as part of a cybersecurity learning program to strengthen practical offensive security skills on embedded systems.

🎯 Objectives

  • Understand the underlying root cause of the vulnerability.

  • Develop a working exploit reliably achieving code execution.

  • Perform debugging and analysis of embedded ARM systems.

  • Highlight the real-world risks of insecure firmware design.

πŸ› οΈ Technical Overview

  • Type of vulnerability: Stack-based buffer overflow.

  • Trigger: Crafted HTTP POST requests to the router’s web interface.

  • Overflow size: Code execution achieved after 446 bytes (discovered with a fuzzing).

  • Architecture: ARM β†’ exploitation performed using ROP gadgets.

  • Impact: Full system compromise without authentication.

πŸ”¬ Debugging & Exploitation Workflow

Debugging and exploit development were performed within an emulated environment using emux, providing full access to the router's firmware and processes:

  • Launching the firmware in a virtualized environment.

  • Attaching the vulnerable httpd process to gdb for live debugging.

  • Sending controlled payloads and observing memory corruption in real time.

  • Identifying offsets and ROP gadgets via firmware extraction and analysis.

  • This approach allowed safe, flexible, and repeatable testing β€” without needing physical hardware.

πŸ“ Repository Structure

Path : : Purpose

exploit-cve-2019-1663.py : : Python scripts to trigger the overflow and gain command execution

rev_shell.py : : Reverse shell listener handling input/output streams

TO DO

  • tools/ Helper scripts/methodology for offset discovery and firmware analysis
  • docs/ (coming soon) Detailed exploitation write-up and methodology

πŸ“Œ Documentation and improvements are actively ongoing β€” suggestions welcome!

⚠️ Legal Disclaimer

  • This project is for educational and authorized testing only.
  • Exploiting devices you do not own or do not have permission to test is strictly illegal and unethical.
  • By using the code in this repository, you accept full responsibility for your actions.

πŸ’¬ Contact

If you want to discuss security research or improvements to this project, feel free to reach out or open an issue. Happy hacking! πŸ˜„

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages