Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation
Switch branches/tags
Nothing to show
Clone or download
Permalink
Failed to load latest commit information.
README.md Update README.md Jul 11, 2018
belkin_exploit.rb Update belkin_exploit.rb Jul 11, 2018

README.md

Belkin-F9K1122v1-Exploit

Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation.

This module exploits an anonymous remote code execution vulnerability within the Belkin F9K1221v1 repeater. The vulnerability is due to a failure to check the length of the HTTP POST argument 'webpage' before copying it into a static stack based buffer of 100 bytes via sprintf() as a string based argument (%s).

The full write-up of how to develop the process continuation shellcode is hosted on Azeria-Labs.com: https://azeria-labs.com/process-continuation-shellcode