Skip to content

Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation

Notifications You must be signed in to change notification settings

azeria-labs/Belkin-F9K1122v1-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Belkin-F9K1122v1-Exploit

Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation.

This module exploits an anonymous remote code execution vulnerability within the Belkin F9K1221v1 repeater. The vulnerability is due to a failure to check the length of the HTTP POST argument 'webpage' before copying it into a static stack based buffer of 100 bytes via sprintf() as a string based argument (%s).

The full write-up of how to develop the process continuation shellcode is hosted on Azeria-Labs.com: https://azeria-labs.com/process-continuation-shellcode

About

Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages