Skip to content

ThatNotEasy/CVE-2024-3273

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

D-Link NAS Command Execution Exploit

This Python script exploits a vulnerability (CVE-2024-3273) in D-Link NAS devices, allowing arbitrary command execution. It leverages the vulnerability to execute commands remotely on the affected devices.

Features

  • Executes arbitrary commands on D-Link NAS devices.
  • Supports both single host and multiple hosts from a file.
  • Concurrent execution of commands for improved efficiency.
  • Option to specify the number of threads for concurrent execution.
  • Option to specify a custom command to execute (default: id).
  • Prints colored output for easy identification of vulnerable hosts and responses.

Requirements

  • Python 3.10
  • Requests library (2.26.0)
  • Colorama library (0.4.6)

Usage

Screenshot_4

python CVE-2024-3273.py [-h] [-u URL] [-f FILENAME] [-o OUTPUT] [-t THREAD] [-c COMMAND]

  • -u, --url: Specify the URL/IP of the target host.
  • -f, --filename: Provide the path to a file containing a list of hosts.
  • -o, --output: Specify the path to save vulnerable hosts.
  • -t, --thread: Number of threads for concurrent execution (default: 5).
  • -c, --command: Specify the command to run (default: id).

References

  • adhikara13

Disclaimer

This script is for educational purposes only. Use it at your own risk.

About

D-Link NAS Command Execution Exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages