Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed

Files from Samuel Huntley

Email addresssamhuntley84 at gmail.com
First Active2015-05-29
Last Active2016-08-15
Linksys E2500 / E1200 Command Injection
Posted Aug 15, 2016
Authored by Samuel Huntley

Linksys E2500 and E1200 devices suffered from a command injection vulnerability.

tags | advisory
MD5 | 4a9806bc0b231056d9a9f35fdc20cac9
Linksys E1200 Authorization Bypass
Posted Aug 15, 2016
Authored by Samuel Huntley

Parent controls on the Linksys E1200 suffered from having missing authorization controls.

tags | advisory, bypass
MD5 | 3c0fca9a22c61bce7065467c592c5e92
D-Link SSDP Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link routers, including DIR-815 and DIR-850L, suffer from an SSDP command injection vulnerability.

tags | exploit
MD5 | b785f7294c313ed9025542ae53a569d6
D-Link DIR-890L/R Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-890L/R suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | d630a7aa3d62b95ae27ab6f21616b2b7
D-Link DIR-866L Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-866L suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | a3e83202c4e00e38dc7ef75d3b07aa7c
D-Link DIR-825 Buffer Overflow / Directory Traversal
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-825 suffers from directory traversal and multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, file inclusion
MD5 | 7785f8227889a20fdbe9bc70479d1763
D-Link DIR-818W Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-818W suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | 9d3911aea3e5a77d99f7d78b379eac6f
D-Link DIR-817LW Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-817LW suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | bb9facadaa8a7d1bc3dfe639e93f0d21
D-Link DIR-815 Buffer Overflow / Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-815 suffers from buffer overflow and command injection vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | 68eb508c7e05375f89d88100c1314bbb
D-Link DIR-645 UPNP Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-645 suffers from a UPNP related buffer overflow vulnerability.

tags | exploit, overflow
MD5 | ec4fbcf9d0e315651268648336045e07
D-Link DIR-615 Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-615 suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | 0cfd7b8afc2f314dc9c9268ee381ac37
D-Link DIR-601 Command Injection
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-601 suffers from a remote command injection vulnerability.

tags | exploit, remote
MD5 | 12f906f3e36be43babfe8381c7b67f48
D-Link DIR-880L Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DIR-880L suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
MD5 | 1dc1781ff7729dfbaf086e2f484a62ac
D-Link DGL5500 HNAP Buffer Overflow
Posted Nov 16, 2015
Authored by Samuel Huntley

D-Link DGL5500 suffers from an HNAP related buffer overflow vulnerability.

tags | exploit, overflow
MD5 | f2a79a3b169c325ec5643665f0625569
D-Link Devices HNAP SOAPAction-Header Command Execution
Posted Jun 1, 2015
Authored by Craig Heffner, Samuel Huntley | Site metasploit.com

Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

tags | exploit
MD5 | 3441fbd8c1fcc5a225cc156757ccb483
D-Link Devices UPnP SOAPAction-Header Command Execution
Posted May 29, 2015
Authored by Craig Heffner, Samuel Huntley | Site metasploit.com

Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

tags | exploit
MD5 | 9120bc404ccb10c6abc177860b52fe17
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    7 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close