Skip to content

azeria-labs/Belkin-F9K1122v1-Exploit

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 

Belkin-F9K1122v1-Exploit

Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation.

This module exploits an anonymous remote code execution vulnerability within the Belkin F9K1221v1 repeater. The vulnerability is due to a failure to check the length of the HTTP POST argument 'webpage' before copying it into a static stack based buffer of 100 bytes via sprintf() as a string based argument (%s).

The full write-up of how to develop the process continuation shellcode is hosted on Azeria-Labs.com: https://azeria-labs.com/process-continuation-shellcode

About

Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages