what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from Samuel Huntley

Email addresssamhuntley84 at gmail.com
First Active2015-05-29
Last Active2019-06-07
Moxa AWK-3121 1.14 Information Disclosure / Command Execution
Posted Jun 7, 2019
Authored by Samuel Huntley

Moxa AWK-3121 version 1.14 devices suffer from authentication bypass, code execution, cross site scripting, and information leakage vulnerabilities.

tags | advisory, vulnerability, code execution, xss, bypass
advisories | CVE-2018-10690, CVE-2018-10691, CVE-2018-10692, CVE-2018-10693, CVE-2018-10694, CVE-2018-10695, CVE-2018-10696, CVE-2018-10697, CVE-2018-10698, CVE-2018-10699, CVE-2018-10700, CVE-2018-10701, CVE-2018-10702, CVE-2018-10703
SHA-256 | 138332a80edebbd2e6c16300ef7d9715536cc1c8845977bb687fcc2fccfa023d
Linksys E2500 / E1200 Command Injection
Posted Aug 15, 2016
Authored by Samuel Huntley

Linksys E2500 and E1200 devices suffered from a command injection vulnerability.

tags | advisory
SHA-256 | 4809215ff6bf7ac34139ad0ed64e0c279221a469257b12c842d63878327b9050
Linksys E1200 Authorization Bypass
Posted Aug 15, 2016
Authored by Samuel Huntley

Parent controls on the Linksys E1200 suffered from having missing authorization controls.

tags | advisory, bypass
SHA-256 | d69510cd73278b8deb8109b50b2d422b2b1d8c1673b2ab98fec4e63eead695a9
D-Link SSDP Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link routers, including DIR-815 and DIR-850L, suffer from an SSDP command injection vulnerability.

tags | exploit
SHA-256 | 4e3d45f3b400f3e40793420869eab5c58bd3c39d461bee57c6634b458e7df6e0
D-Link DIR-890L/R Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-890L/R suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | cd1df1d1cdcb3560bfe1fb8e95d212750348f394ef3b8cacab3a1a40a2fda2f3
D-Link DIR-866L Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-866L suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 3ef1622faf16aa166e4b8719b10d588766b2d43ed4dc93795867aaf1931ca44e
D-Link DIR-825 Buffer Overflow / Directory Traversal
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-825 suffers from directory traversal and multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, file inclusion
SHA-256 | 089312d00bd7617a90005a2b391ccd5c79d8b1ba03af87fcce33c25d18a4dec8
D-Link DIR-818W Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-818W suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 792f201b6febeb5bef3e850608ded1e1902fb3c4fecb5c4a97871f704fc50dae
D-Link DIR-817LW Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-817LW suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | c271b40e08b71e1680654bf98814d930b7990c5e610021b71b477680b92e0ef8
D-Link DIR-815 Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-815 suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 9e14cf8ca2c86190abc6b7f6945adc96af331a97ca6a82ab9e8e0a093ec992b1
D-Link DIR-645 UPNP Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-645 suffers from a UPNP related buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | a725188c222995513715c3316a51f4501c5cd39ef45e1ad1f1f79fe105502fe8
D-Link DIR-615 Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-615 suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | fc9f8d1f24355c1c5cf793c56630210f961a72482197368a6705a3b904ee102d
D-Link DIR-601 Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-601 suffers from a remote command injection vulnerability.

tags | exploit, remote
SHA-256 | 6bff534b5c2880dabd13a2439a6fa09119564218ef2843e8bb570c8b0fdfa83e
D-Link DIR-880L Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-880L suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 747455371bcce4c79c35c068ab0912a98b4fd795ca97c00e7afdfa5288944be1
D-Link DGL5500 HNAP Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DGL5500 suffers from an HNAP related buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 4318b5f50ece63ea8d840d9fc299d1f4b18880de6313f2a34bc88149f4e48a23
D-Link Devices HNAP SOAPAction-Header Command Execution
Posted Jun 1, 2015
Authored by Craig Heffner, Samuel Huntley | Site metasploit.com

Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

tags | exploit
SHA-256 | fc44a93eba283e1584275d9596c2494164e66d54813e74e0886f302958943e2e
D-Link Devices UPnP SOAPAction-Header Command Execution
Posted May 29, 2015
Authored by Craig Heffner, Samuel Huntley | Site metasploit.com

Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

tags | exploit
SHA-256 | e20ef0dd89ff88caf92c753721ba8454b95e56f6cc1668c930745008c71c7246
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close