Exploit for the CVE-2019-16278 vulnerability# CVE-2019-16278

This is an exploit for the CVE-2019-16278 vulnerability.
It allows remote code execution on an **nhttpd** server *v1.9.6*.
## Building from Source
This tool is written in Rust and you need to install the Rust compiler which is super easy if you follow the instructions in their [page](https://www.rust-lang.org/tools/install)
### Compiling
Once you have the compiler and `cargo` installed, you can run:
```bash
cargo build
```
## Example
```bash
./cve-2019-16278 10.10.1.1 80 "cat /etc/passwd"
```
This example connects to the host 10.10.1.1 on port 80 and executes the `cat /etc/passwd` on the remote host.
[4.0K] /data/pocs/6bb43ef632604da7bfdf709748161daa8c57f831
├── [ 379] Cargo.lock
├── [ 220] Cargo.toml
├── [ 707] README.md
└── [4.0K] src
├── [1.2K] exploit.rs
└── [ 834] main.rs
1 directory, 5 files