header-logo
Suggest Exploit
vendor:
BullDog Plus UPS-Service
by:
milw0rm.com
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: BullDog Plus UPS-Service
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2009

Belkin BullDog Plus UPS-Service Buffer Overflow Exploit

This exploit is tested on Windows XP SP3 and uses JMP ESP from user32.dll, 0x7E429353. Shellcode is bind 4444 from Metasploit. The exploit can be run using the command 'nc host port < belkin-buldog-exploit'.

Mitigation:

Apply the latest security patches and updates to the system to prevent buffer overflow attacks.
Source

Exploit-DB raw data:

Belkin BullDog Plus UPS-Service Buffer Overflow Exploit

Tested on Windows XP SP3
JMP ESP from user32.dll, 0x7E429353
Shellcode is bind 4444 from Metasploit

nc host port < belkin-buldog-exploit

Thats all folks!

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8173.zip (2009-belkin-bulldog-exploit.zip)

# milw0rm.com [2009-03-09]