This Metasploit module exploits a file retrieval vulnerability in EasyCafe Server. The vulnerability can be triggered by sending a specially crafted packet (opcode 0x43) to the 831/TCP port. This Metasploit module has been successfully tested on EasyCafe Server version 2.2.14 (Trial mode and Demo mode) on Windows XP SP3 and Windows 7 SP1. Note that the server will throw a popup messagebox if the specified file does not exist.
33d40a2aa040357554a8308847a479cb0f61d14ed8afe5d9bd0a74c18bb67185
This Metasploit module can be used to enable auto-answer mode for the D-Link i2eye video conferencing system. Once this setting has been flipped, the device will accept incoming video calls without acknowledgement. The NetMeeting software included in Windows XP can be used to connect to this device. The i2eye product is no longer supported by the vendor and all models have reached their end of life (EOL).
e460acaa6e0c054d6e3b8a7dca3a235e05a5a203c7bf6bce10d2f645c7bd255d
This Metasploit module triggers a NULL dereference in svchost.exe on all current versions of Windows that run the RRAS service. This service is only accessible without authentication on Windows XP SP1 (using the SRVSVC pipe).
8059fb8c22d151c258655d2081e63afe11bd42018fe842fb2ca56e2bfad094d4
This Metasploit module exploits a denial of service vulnerability within the Internet Connection Sharing service in Windows XP.
4081d9e66e799fc1ee17b0b334e5116b16098d5626022f9a6fbefbbbbb1c9417