CVE-2022-33106
WiJungle Next Generation Firewall U250# Vendor Homepage: https://www.wijungle.com/# OS version: 9.4.9
# Exploit Title: WiJungle U250 NGFW - Brute-Force attack
# Category: Hardware
# Exploit Author: Harshit Rajpal
# Hardware Model: WiJungle Next Generation Firewall U250
# Vendor Homepage: https://www.wijungle.com/# OS version: 9.4.9
# CVE ID: CVE-2022-33106
# Date: 27.06.2022
##########################################################################
Steps to Reproduce -
- Navigate to the WiJungle login page situated at local IP address.
- Turn on the Burp Proxy. Add random username,password and capture request.
- Send the request to intruder and launch a sniper attack with adding username and password in payload.
- Try for most common usernames. You can use the file: https://github.com/danielmiessler/SecLists/blob/master/Usernames/top-usernames-shortlist.txt
- Try for the most common passwords using various lists available online.
- Run the attack and you will find that the WiJungle NGFW has a "NO RATE LIMIT" which allows a user to brute-force admin credentials.
- I compromised the admin credentials on an approx combination of 30,000th payload.
Last updated