what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from Samuel Huntley

Email addresssamhuntley84 at gmail.com
First Active2015-05-29
Last Active2019-06-07
Moxa AWK-3121 1.14 Information Disclosure / Command Execution
Posted Jun 7, 2019
Authored by Samuel Huntley

Moxa AWK-3121 version 1.14 devices suffer from authentication bypass, code execution, cross site scripting, and information leakage vulnerabilities.

tags | advisory, vulnerability, code execution, xss, bypass
advisories | CVE-2018-10690, CVE-2018-10691, CVE-2018-10692, CVE-2018-10693, CVE-2018-10694, CVE-2018-10695, CVE-2018-10696, CVE-2018-10697, CVE-2018-10698, CVE-2018-10699, CVE-2018-10700, CVE-2018-10701, CVE-2018-10702, CVE-2018-10703
SHA-256 | 138332a80edebbd2e6c16300ef7d9715536cc1c8845977bb687fcc2fccfa023d
Linksys E2500 / E1200 Command Injection
Posted Aug 15, 2016
Authored by Samuel Huntley

Linksys E2500 and E1200 devices suffered from a command injection vulnerability.

tags | advisory
SHA-256 | 4809215ff6bf7ac34139ad0ed64e0c279221a469257b12c842d63878327b9050
Linksys E1200 Authorization Bypass
Posted Aug 15, 2016
Authored by Samuel Huntley

Parent controls on the Linksys E1200 suffered from having missing authorization controls.

tags | advisory, bypass
SHA-256 | d69510cd73278b8deb8109b50b2d422b2b1d8c1673b2ab98fec4e63eead695a9
D-Link SSDP Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link routers, including DIR-815 and DIR-850L, suffer from an SSDP command injection vulnerability.

tags | exploit
SHA-256 | 4e3d45f3b400f3e40793420869eab5c58bd3c39d461bee57c6634b458e7df6e0
D-Link DIR-890L/R Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-890L/R suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | cd1df1d1cdcb3560bfe1fb8e95d212750348f394ef3b8cacab3a1a40a2fda2f3
D-Link DIR-866L Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-866L suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 3ef1622faf16aa166e4b8719b10d588766b2d43ed4dc93795867aaf1931ca44e
D-Link DIR-825 Buffer Overflow / Directory Traversal
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-825 suffers from directory traversal and multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, file inclusion
SHA-256 | 089312d00bd7617a90005a2b391ccd5c79d8b1ba03af87fcce33c25d18a4dec8
D-Link DIR-818W Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-818W suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 792f201b6febeb5bef3e850608ded1e1902fb3c4fecb5c4a97871f704fc50dae
D-Link DIR-817LW Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-817LW suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | c271b40e08b71e1680654bf98814d930b7990c5e610021b71b477680b92e0ef8
D-Link DIR-815 Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-815 suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 9e14cf8ca2c86190abc6b7f6945adc96af331a97ca6a82ab9e8e0a093ec992b1
D-Link DIR-645 UPNP Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-645 suffers from a UPNP related buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | a725188c222995513715c3316a51f4501c5cd39ef45e1ad1f1f79fe105502fe8
D-Link DIR-615 Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-615 suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | fc9f8d1f24355c1c5cf793c56630210f961a72482197368a6705a3b904ee102d
D-Link DIR-601 Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-601 suffers from a remote command injection vulnerability.

tags | exploit, remote
SHA-256 | 6bff534b5c2880dabd13a2439a6fa09119564218ef2843e8bb570c8b0fdfa83e
D-Link DIR-880L Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-880L suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 747455371bcce4c79c35c068ab0912a98b4fd795ca97c00e7afdfa5288944be1
D-Link DGL5500 HNAP Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DGL5500 suffers from an HNAP related buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 4318b5f50ece63ea8d840d9fc299d1f4b18880de6313f2a34bc88149f4e48a23
D-Link Devices HNAP SOAPAction-Header Command Execution
Posted Jun 1, 2015
Authored by Craig Heffner, Samuel Huntley | Site metasploit.com

Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

tags | exploit
SHA-256 | fc44a93eba283e1584275d9596c2494164e66d54813e74e0886f302958943e2e
D-Link Devices UPnP SOAPAction-Header Command Execution
Posted May 29, 2015
Authored by Craig Heffner, Samuel Huntley | Site metasploit.com

Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

tags | exploit
SHA-256 | e20ef0dd89ff88caf92c753721ba8454b95e56f6cc1668c930745008c71c7246
Page 1 of 1
Back1Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close