This python program runs nmap on an address passed as an argument, by default it runs on all ports but port number can also be given as an argument. It runs nmap with custom created wolf_ssh_version.nse scripts which uses fingerprinting to identify wolfSSH v1.4.7 which contains an integer overflow vulnerability with assigned CVE-2022-32073. Program can be run on any machine which has following prerequisites installed: nmap and also python3 along with necessary libraries.
To see options and description run the program with the following command.
python3 scanner_for_CVE-2022-32073.py --help
To run the program on a given address or address range and scan all ports on each host use the following command
python3 scanner_for_CVE-2022-32073.py -a IP
To run the program on a given address or address range and scan given port or port range on each host use the following command
python3 scanner_for_CVE-2022-32073.py -a IP -p PORTS
The screenshot shows sample use of the programs fingerprinting ability and output formatting on a different version of SSH.
For more info refer to the Documentation.pdf or refer to the https://nmap.org/.