pyubee


Namepyubee JSON
Version 0.15 PyPI version JSON
download
home_pagehttp://github.com/mzdrale/pyubee
SummarySimple library for getting stats from Ubee routers.
upload_time2024-09-02 19:50:16
maintainerNone
docs_urlNone
authorMiroslav Zdrale
requires_pythonNone
licenseNone
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # PyUbee

Python library for getting stats from [Ubee routers](http://www.ubeeinteractive.com/products).

## Installation

You can install PyUbee from PyPi using `pip3 install pyubee`.

## Usage

To use within your Python scripts:
```python
from pyubee import Ubee

ubee = Ubee(
                host='192.168.1.1',
                username='admin',
                password='somepassword'
            )

if not ubee.session_active():
    ubee.login()

devices = ubee.get_connected_devices()

for x in devices:
    print('%s (%s)' % (x, devices[x]))

ubee.logout()
```

## CLI

A simple command line interface is available to query the router. The cli takes `host`, `username`, and `password` as mandatory arguments. The optional argument `model` can be used to specify the model of your router. If model is not specified, this tool will try to detect it automatically.

```
$ pyubee --help
usage: pyubee [-h] [--model MODEL] host username password

pyubee

positional arguments:
  host           Host
  username       Username
  password       Password

optional arguments:
  -h, --help     show this help message and exit
  --model MODEL  Model, supported models: EVW32C-0N, EVW3200-Wifi

$ pyubee 192.168.1.1 admin somepassword
AA:BB:CC:DD:EE:FF	192.168.1.10
FF:EE:DD:CC:BB:AA	192.168.1.11
```

## Notice

Ubee devices contain vulnerability which allows user to access Admin Web UI without logging in if someone else is logged in from the same IP address. For example if you have Ubee router (e.g. 192.168.1.1) in your home installed from your ISP and you have your own router (192.168.1.2) connected to it and you are doing NAT (Network Address Translation) on your router, then Ubee router will see all connections from clients connected to your router coming from the same IP address 192.168.1.2. In that scenario if someone logs into Ubee router Admin Web UI (http://192.168.1.1/UbeeLanSetup.asp) from Computer A, then anyone from Computer B or Computer C can access http://192.168.1.1/UbeeLanSetup.asp or any other page on 192.168.1.1 without logging in.

```
             +---------------+
             |               |
             |               |
             |     UBEE      |
             |               |
             |  192.168.1.1  |
             +-------+-------+
                     |
             +-------+-------+
             |  192.168.1.2  |
             |               |
             |  YOUR ROUTER  |
             |               |
             |   10.0.0.1    |
             +-------+-------+
                     |
      +-----------------------------+
      |              |              |
+-----+-----+  +-----+-----+  +-----+-----+
|  COMPUTER |  | COMPUTER  |  | COMPUTER  |
|     A     |  |     B     |  |     C     |
|           |  |           |  |           |
| 10.0.0.11 |  | 10.0.0.12 |  | 10.0.0.13 |
+-----------+  +-----------+  +-----------+
```

You should have this in your mind if you have similar setup.

Author of this package reported this issue to Vendor, even if [it's known for years](https://www.exploit-db.com/exploits/40156), but there is no response from Vendor and it looks like they are pushing firmware with the same vulnerability probably to all of their devices.

## Supported routers

This library was written for and tested with:

* Ambit EVW320B
* Ambit EVW321B
* Ubee DDW36C
* Ubee DVW32CB
* Ubee EVW32C-0S
* Ubee EVW32C-0N
* Ubee EVW3200-Wifi
* Ubee EVW3226 (UPC)
* Ubee UBC1303BA00

            

Raw data

            {
    "_id": null,
    "home_page": "http://github.com/mzdrale/pyubee",
    "name": "pyubee",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": null,
    "author": "Miroslav Zdrale",
    "author_email": "mzdrale@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/31/f1/605c296eb1e8fa03bce9ac4eaf1fd175769d3df800b94e3dc1aeb827f35a/pyubee-0.15.tar.gz",
    "platform": null,
    "description": "# PyUbee\n\nPython library for getting stats from [Ubee routers](http://www.ubeeinteractive.com/products).\n\n## Installation\n\nYou can install PyUbee from PyPi using `pip3 install pyubee`.\n\n## Usage\n\nTo use within your Python scripts:\n```python\nfrom pyubee import Ubee\n\nubee = Ubee(\n                host='192.168.1.1',\n                username='admin',\n                password='somepassword'\n            )\n\nif not ubee.session_active():\n    ubee.login()\n\ndevices = ubee.get_connected_devices()\n\nfor x in devices:\n    print('%s (%s)' % (x, devices[x]))\n\nubee.logout()\n```\n\n## CLI\n\nA simple command line interface is available to query the router. The cli takes `host`, `username`, and `password` as mandatory arguments. The optional argument `model` can be used to specify the model of your router. If model is not specified, this tool will try to detect it automatically.\n\n```\n$ pyubee --help\nusage: pyubee [-h] [--model MODEL] host username password\n\npyubee\n\npositional arguments:\n  host           Host\n  username       Username\n  password       Password\n\noptional arguments:\n  -h, --help     show this help message and exit\n  --model MODEL  Model, supported models: EVW32C-0N, EVW3200-Wifi\n\n$ pyubee 192.168.1.1 admin somepassword\nAA:BB:CC:DD:EE:FF\t192.168.1.10\nFF:EE:DD:CC:BB:AA\t192.168.1.11\n```\n\n## Notice\n\nUbee devices contain vulnerability which allows user to access Admin Web UI without logging in if someone else is logged in from the same IP address. For example if you have Ubee router (e.g. 192.168.1.1) in your home installed from your ISP and you have your own router (192.168.1.2) connected to it and you are doing NAT (Network Address Translation) on your router, then Ubee router will see all connections from clients connected to your router coming from the same IP address 192.168.1.2. In that scenario if someone logs into Ubee router Admin Web UI (http://192.168.1.1/UbeeLanSetup.asp) from Computer A, then anyone from Computer B or Computer C can access http://192.168.1.1/UbeeLanSetup.asp or any other page on 192.168.1.1 without logging in.\n\n```\n             +---------------+\n             |               |\n             |               |\n             |     UBEE      |\n             |               |\n             |  192.168.1.1  |\n             +-------+-------+\n                     |\n             +-------+-------+\n             |  192.168.1.2  |\n             |               |\n             |  YOUR ROUTER  |\n             |               |\n             |   10.0.0.1    |\n             +-------+-------+\n                     |\n      +-----------------------------+\n      |              |              |\n+-----+-----+  +-----+-----+  +-----+-----+\n|  COMPUTER |  | COMPUTER  |  | COMPUTER  |\n|     A     |  |     B     |  |     C     |\n|           |  |           |  |           |\n| 10.0.0.11 |  | 10.0.0.12 |  | 10.0.0.13 |\n+-----------+  +-----------+  +-----------+\n```\n\nYou should have this in your mind if you have similar setup.\n\nAuthor of this package reported this issue to Vendor, even if [it's known for years](https://www.exploit-db.com/exploits/40156), but there is no response from Vendor and it looks like they are pushing firmware with the same vulnerability probably to all of their devices.\n\n## Supported routers\n\nThis library was written for and tested with:\n\n* Ambit EVW320B\n* Ambit EVW321B\n* Ubee DDW36C\n* Ubee DVW32CB\n* Ubee EVW32C-0S\n* Ubee EVW32C-0N\n* Ubee EVW3200-Wifi\n* Ubee EVW3226 (UPC)\n* Ubee UBC1303BA00\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Simple library for getting stats from Ubee routers.",
    "version": "0.15",
    "project_urls": {
        "Homepage": "http://github.com/mzdrale/pyubee"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "31f1605c296eb1e8fa03bce9ac4eaf1fd175769d3df800b94e3dc1aeb827f35a",
                "md5": "76d394f412055a9dffecae21e8cba3da",
                "sha256": "134dceb3de50b9405605abeac1805fd246da72d6922bfdb5693458a6b549c953"
            },
            "downloads": -1,
            "filename": "pyubee-0.15.tar.gz",
            "has_sig": false,
            "md5_digest": "76d394f412055a9dffecae21e8cba3da",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 21124,
            "upload_time": "2024-09-02T19:50:16",
            "upload_time_iso_8601": "2024-09-02T19:50:16.913991Z",
            "url": "https://files.pythonhosted.org/packages/31/f1/605c296eb1e8fa03bce9ac4eaf1fd175769d3df800b94e3dc1aeb827f35a/pyubee-0.15.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-09-02 19:50:16",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "mzdrale",
    "github_project": "pyubee",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "tox": true,
    "lcname": "pyubee"
}
        
Elapsed time: 4.87945s