/CVE-2024-40617

CVE-2024-40617 Exploit PoC

Primary LanguagePython

CVE-2024-40617

Exploit PoC for CVE-2024-40617

Description

See Medium publication for a detail description (Fujitsu M2M GW1500 : From M2M to M2M2P0wn)

Usage

 __  __ ____            ____  ____   ___                 
|  \/  |___ \ _ __ ___ |___ \|  _ \ / _ \__      ___ __  
| |\/| | __) | '_ ` _ \  __) | |_) | | | \ \ /\ / / '_ \ 
| |  | |/ __/| | | | | |/ __/|  __/| |_| |\ V  V /| | | |
|_|  |_|_____|_| |_| |_|_____|_|    \___/  \_/\_/ |_| |_|

usage: CVE-2024-40617-PoC.py [-h] [--version] -t TARGET -p PASSWORD (-c | -e)

CVE 2024-40617 Exploit PoC

optional arguments:
  -h, --help                          show this help message and exit
  --version                           show program's version number and exit
  -t TARGET, --target TARGET          Target hostname
  -p PASSWORD, --password PASSWORD    Admin Password
  -c, --check                         Check vulnerability (Not yet implemented)
  -e, --exploit                       Exploit vulnerability

References

JVN publication

TODO

  • Check vulnerability function

Disclaimer

The code contained in this project is intended only for research and usage on systems where the user has explicit authorization.
The author of this project is not responsible or liable for misuse of the software.
Use responsibly and don't be evil