9.1
CVSSv3

CVE-2018-14847

Published: 02/08/2018 Updated: 07/03/2019
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 658
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

MikroTik RouterOS up to and including 6.42 allows unauthenticated remote malicious users to read arbitrary files and remote authenticated malicious users to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mikrotik routeros

Exploits

/* # Exploit Title: RouterOS Remote Rooting # Date: 10/07/2018 # Exploit Author: Jacob Baines # Vendor Homepage: wwwmikrotikcom # Software Link: mikrotikcom/download # Version: Longterm: 6301 - 6407 Stable: 629 - 642 Beta: 629rc1 - 643rc3 # Tested on: RouterOS Various # CVE : CVE-2018-14847 By the Way is an exploit coded in C++ ...
Mikrotik WinBox version 642 suffers from a credential disclosure vulnerability ...
Mikrotik RouterOS versions 6x suffer from a remote root code execution vulnerability ...

Github Repositories

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

Exploting Winbox remote vulnerability (analysing & educational use)

WinboxExploit This is a proof of concept for the CVE-2018-14847 Winbox vulnerability, This allows a remote attack to read arbitrary files Vulnerable Versions All RouterOS versions from 2015-05-28 to 2018-04-20 are vulnerable to this exploit Mikrotik devices running RouterOS versions: Longterm: 6301 - 6407 Stable: 629 - 642 Beta: 629rc1 - 643rc3 For more information se

PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script

Mikrotik Login Exploit PoC (Proof of Concept) dari vulnerability mikrotik CVE-2018-14847 (terutama pada winbox), memiliki cara kerja membaca password langsung dari RouterOS pada port default 8291 Original by: githubcom/BigNerd95/ Requirements Python 3+ Instalasi pada Linux apt install python3 Contoh Penggunaan WinBox (TCP/IP)

Ladon Pentest Scanner framework 全平台Go开源内网渗透扫描器框架,Windows/Linux/Mac内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。

Ladon Scanner For Golang Wiki k8gegeorg/Ladon/LadonGohtml 简介 LadonGo一款开源内网渗透扫描器框架,使用它可轻松一键探测C段、B段、A段存活主机、指纹识别、端口扫描、密码爆破、远程执行、高危漏洞检测等。38版本包含32个功能,高危漏洞检测MS17010、SmbGhost,远程执行SshCmd、WinrmCmd、PhpShell

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

mnk

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

Mikrotik Login Exploit PoC (Proof of Concept) dari vulnerability mikrotik CVE-2018-14847 (terutama pada winbox), memiliki cara kerja membaca password langsung dari RouterOS pada port default 8291 Original by: githubcom/BigNerd95/ Requirements Python 3+ Instalasi pada Linux apt install python3 Contoh Penggunaan WinBox (TCP/IP)

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

CVE-2018-14847 create global proxy based on RouterOS via CVE-2018-14847 How To Use prepare pip3 install paramiko ipcalc optparse hashlib usage for ip file python3 looppy -f [listtxt] for single ip python3 looppy [ip] Copyright the poc part in this repository t

Ladon for Kali 全平台开源内网渗透扫描器,Windows/Linux/Mac/路由器内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。

Ladon Scanner For Golang Wiki k8gegeorg/Ladon/LadonGohtml Introduction LadonGo is an open source intranet penetration scanner framework, which can be used to easily detect segment C, B, A live hosts, fingerprint identification, port scanning, password explosion, remote execution, high-risk vulnerability detection, etc Version 40 includes 37 functions, high ri

Meris RouterOS Checker This tool will check a list of ip addresses of RouterOS-based routers to validate if they were infected with Meris The tool will: Attempt to connect using credentials in credentialstxt file (1 pair of credentials per line, default provided) Attempt to exploit the router using CVE-2018-14847 The tool supports: RouterOS API SSH WinBox (tested for &

Pyhton Script for winbox exploit

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

A curated list of my GitHub stars!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents ASL Assembly AutoHotkey Batchfile C C# C++ CMake CSS Clojure CoffeeScript Dockerfile F# Go Groovy HTML Haskell Java JavaScript Jupyter Notebook Kotlin Logos Lua Makefile Objective-C Objective-C++ Others PHP Pascal Perl PowerShell Prolog Python Rascal Roff Ruby Rust Scala Shell Swift TSQL TeX Typ

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore You can fork it and update it yourself instead Blogpost n0pme/winbox-bug-dissection/ Requirement

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

sapulidi mikrotik

sapulidi Sapulidi adalah script untuk membersihkan script berbahaya dari attacker yang menyerang mikrotik menggunakan vulnerability CVE-2018-14847 di routerOS Versions affected: Affected all bugfix releases from 6301 to 6407, fixed in 6408 on 2018-Apr-23 Affected all current releases from 629 to 642, fixed in 6421 on 2018-Apr-23 Affected all RC releases from 629rc1

Proof of Concepts

PoC Includes PoC related works CVE-2018-14847(Mikrotik Router OS Winbox) This is the proof of concept about Mikrotick RouterOS Winbox vulnerablity(CVE-2018-14847) This can connect to the routeros server, fetches user names and passwords, and create a file that can be used for the future attack It is the python version of githubcom/tenable/routeros/blob/master/poc/by

Automated version of CVE-2018-14847 (MikroTik Exploit)

MikroRoot Automated version of CVE-2018-14847 It will scrape shodan for vulnerable host and then try to exploit them How to use Note that this script will NOT run with Python2x Use only Python 3+ MikroRoot: python3 MikroRootpy -k SHODAN_KEY -p page count User: ncss Pass: ncss!@#2018 IP: 1234 Arguments -p page count to scrape -k Shodan key Author of exploit githu

C# implementation of BasuCert/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]

WinboxExploit C# implementation of BasuCert/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)] Just reimplemented a solution from [githubcom/BasuCert/WinboxPoC]

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore You can fork it and update it yourself instead Blogpost n0pme/winbox-bug-dissection/ Requirement

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

Cracker-Winbox #PIRATAS INFORMATICOS WinboxExploit Esta es una prueba de concepto de la vulnerabilidad crítica de WinBox (CVE-2018-14847) que permite la lectura de archivos arbitrarios de contraseñas de texto sin formato Requisitos Python 3+ Este script NO se ejecutará con Python 2xo inferior Cómo utilizar El script se usa de manera simple con a

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

hack

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

Config files for my GitHub profile.

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore You can fork it and update it yourself instead Blogpost n0pme/winbox-bug-dissection/ Requirement

This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore You can fork it and update it yourself instead Blogpost n0pme/winbox-bug-dissection/ Requirement

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore You can fork it and update it yourself instead Blogpost n0pme/winbox-bug-dissection/ Requirement

Mass MikroTik WinBox Exploitation tool, CVE-2018-14847

Mikrotik Beast tool Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit Usage $ python3 mikrotikbeastpy Accepted input examples Example 1: '19216850/24' Example 2: '1721600/16' NOTES: This is just an addition to the orginal work @ BigNerd95

Space

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments in the commandline WinBox (TCP/IP) Explo

This tool will check a list of IP addresses of RouterOS-based routers to validate if they were infected with Meris.

Meris RouterOS Checker This tool will check a list of ip addresses of RouterOS-based routers to validate if they were infected with Meris The tool will: Attempt to connect using credentials in credentialstxt file (1 pair of credentials per line, default provided) Attempt to exploit the router using CVE-2018-14847 The tool supports: RouterOS API SSH WinBox (tested for &

This is a python wifi (router) hacker , having ability to search for mikrotic devices around you and get their <MAC> address then extract their user and password

please this was created by John , and shouldn't be used for any opposite intentions WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords Requirements Python 3+ This script will NOT run with Python 2x or lower How To Use The script is simple used with simple arguments

MikroTik vulnerability assessment tool

MkCheck s1l3nt78 The Dead Bunny Collective Because exploitation is fun Additions ChimneyBlue SMB BufferOverflow Exploit (x86/mips) RouterOS Jailbreak support for Mikrotik versions 2 - 6443 Moved repo location (s1lnt78 -&gt; whiterabb17) IMPORTANT This software should not be used within any system or network for which you do not have permission, nor should it be used

Config files for my GitHub profile.

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore You can fork it and update it yourself instead Blogpost n0pme/winbox-bug-dissection/ Requirement

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords wwwexploit-dbcom/exploits/45170 Blogpost n0pme/winbox-bug-dissection/ Requirements Python 3+ Script ini tidak bisa jalan di python versi 2x atau di bawahnya Cara Menggunakan Sangat simple untuk menggun

By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:

By the Way By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions: Longterm: 6301 - 6407 Stable: 629 - 6420 Beta: 629rc1 - 643rc3 The exploit leverages the path traversal vulnerability CVE-2018-14847 to extract the admin password and create an "option" package to enable the developer backdoor Post exploitation the

_ _ ___ _ _ _ _ _|_|___| |_ ___ _ _ | | | | | | | | | | |_'_| | _|_ |_____|_|_|_|___|___|_,_| |_| |___| pywinbox A MikroTik's Winbox protocol honeypot pywinbox parses and understands Winbox communications log them and answer to them working as a medium interaction honeypot or

Ladon Scanner For Golang Wiki k8gegeorg/Ladon/LadonGohtml Introduction LadonGo is an open source intranet penetration scanner framework, which can be used to easily detect segment C, B, A live hosts, fingerprint identification, port scanning, password explosion, remote execution, high-risk vulnerability detection, etc Version 40 includes 37 functions, high ri

WinboxExploit This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore You can fork it and update it yourself instead Blogpost n0pme/winbox-bug-dissection/ Requirement

Recent Articles

If you haven't already patched your MikroTik router for vulns, then if you could go do that, that would be greeeeaat
The Register • Richard Chirgwin • 11 Oct 2018

MikroTik. Stupid name. Stupid bugs. Get those fixes MikroTik routers grab their pickaxes, descend into the crypto mines

If you haven't installed a batch of patches for bugs in your MikroTik routers – and two thirds of owners apparently haven't – then stiffen the sinews and summon up the blood: you really need to update your firmware. The vulnerabilities, which were addressed by the manufacturer way back in August in software updates, can lead all the way up to remote code execution (RCE) if exploited. We're told that roughly 68 per cent of vulnerable MikroTik gear facing the internet remain unpatched, though....

Fancy Bear still Putin out new modules for VPNFilter malware
The Register • Richard Chirgwin • 27 Sep 2018

Talos turns up obfuscation, lateral attacks, and proxies

Cunning malware VPNFilter remains under active development, and is acquiring ever more dangerous features. That's the conclusion Cisco's Talos Intelligence security team reached after delving into recent samples and identifying seven “third-stage VPNFilter modules that add significant functionality to the malware”. VPNFilter rose to prominence in May, when Talos found half a million pwned home routers and NAS boxes in 54 countries. The FBI attributed the attacks to Russia's Sofacy group (“...

Mikrotik routers pwned en masse, send network data to mysterious box
The Register • Shaun Nichols in San Francisco • 04 Sep 2018

Researchers uncover botnet malware pouncing on security holes MikroTik routers grab their pickaxes, descend into the crypto mines

More than 7,500 Mikrotik routers have been compromised with malware that logs and transmits network traffic data to an unknown control server. This is according to researchers from 360 Netlab, who found the routers had all been taken over via an exploit for CVE-2018-14847, a vulnerability first disclosed in the Vault7 data dump of supposed CIA hacking tools. Since mid-July, Netlab said, attackers have looked to exploit the flaw and enlist routers to do things like force connected machines to min...

Has Trickbot gang hijacked your router? This scanner may have an answer
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Get our weekly newsletter Thanks... Micro... soft... OK, there, we said it

Microsoft has published a tool that scans for and detects MikroTik-powered Internet-of-Things devices that have been hijacked by the Trickbot gang. The open-source scanner comes after an investigation by Redmond's Defender for IoT research team into how the nefarious malware crew takes over MikroTik routers and sets them up to funnel communications to and from Trickbot-infected computers on the network and the criminals' backend servers. In a release note this week, Microsoft's security team out...