Posted on 1 Comment

Remote Code Execution in IPFire Firewall

Hello aspiring Hackers. In this howto, you will learn how to exploit a remote code execution vulnerability in IPFire Firewall.  Firewalls are one of the most important components in the security of a network. Vulnerabilities in firewalls can be more serious. Today we will see one such vulnerability.

IPFire is an open source firewall,router and VPN  built form LFS( Linux From Scratch ). All the versions below 2.19 of this firewall suffer from rce vulnerability in proxy.cgi page. Today we will see how to exploit this vulnerability with Metasploit. This vulnerability can be exploited only if credentials are known. So all users using credentials which can be guessed easily are vulnerable. Ipfire firewall hacking

Start Metasploit, load the exploit and check the options required.

Type command “show payloads” to see all the payloads.

Set the required payload.

Set the required options as shown below. As already said, we need the credentials and of course the target IP address. After all the options are set, use the “run” command to execute the exploit. We will get the target’s shell as shown below.

To test this, type “ls” command to list the contents of the present directory.

That was all about exploiting remote code execution in IPFire Firewall. See how to hack Windows 10 with Hercules.

Want to learn Ethical Hacking with Real World Hacking Scenarios? Subscribe to our Digital Magazine Now.

Follow Us

1 thought on “Remote Code Execution in IPFire Firewall

  1. […] If your bash version is vulnerable, update the bash. See another method of hacking IPFire Firewall. […]

Comments are closed.