Start Metasploit and load the module as shown below. On performing a verbose scan with OS detection enabled to probe further, it is indeed clear that a Serviio Media Server is running on this specific port and our target OS is Windows, so we can use our exploit. So imagine a hacker while port scanning a specific port on multiple machines as shown below gets one positive result.
This parameter is used in a call to cmd.exe which results in execution of arbitrary commands. This is possible because the console service exposes a REST API whose endpoint does not sanitize user-supplied data in the ‘VIDEO’ parameter of the ‘checkStreamUrl’ method. This module exploits an unauthenticated remote command execution vulnerability in this console component. This media server has a console component which runs on port 23423 by default.
Serviio media server is a free media server which allows users to stream media files (music, video or images) to renderer devices like a TV set, Bluray player, gaming console or mobile phone on your connected home network. This exploit works on Serviio Media Server from versions 1.4.0 to 1.8.0 (1.8 is the present version, by the way).
Today we will learn about the Serviio media server Command Execution Exploit.