Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19492 PoC — FreeSWITCH 信任管理问题漏洞

Source
Associated Vulnerability
Title:FreeSWITCH 信任管理问题漏洞 (CVE-2019-19492)
Description:FreeSWITCH 1.6.10 through 1.10.1 has a default password in event_socket.conf.xml.
Description
FreeSWITCH Exploit (CVE-2019-19492)
Readme
# FreeSWITCH Exploit (CVE-2019-19492)

This is an exploit script for FreeSWITCH vulnerabilities by Chocapikk and TrHacknon.

## Description

This script allows you to exploit FreeSWITCH vulnerabilities by executing remote commands. It supports exploitation of a single specified target or a list of targets specified in a file. It also has the ability to automatically generate a list of targets from Shodan.

## Prerequisites

- Python 3.6+
- `shodan` library (installed with `pip install shodan`)
- `rich` library (installed with `pip install rich`)
- `prompt_toolkit` library (installed with `pip install prompt_toolkit`)

## Usage

```
python exploit.py [--target TARGET --port PORT] [--list LIST] [--auto --pages PAGES] [--output FILE]
```

Options:
- `--target TARGET`: Specifies a single target IP to exploit.
- `--list LIST`: Specifies a file with a list of targets in the format ip:port. If port is not specified, default port will be used.
- `--port PORT`: Specifies a port for the target (default: 8021).
- `--auto`: Automatically generates a list of targets from Shodan.
- `--pages PAGES`: Specifies the number of pages for Shodan search (default: 1).
- `--output FILE`: Specifies the output file for storing the vulnerable targets.

If you use the `--target TARGET` or `--list LIST` option, the script will attempt to exploit the specified target(s).

If you use the `--auto` option, the script will automatically generate a list of targets from Shodan and attempt to exploit each target.

## Notes

- Make sure you have set your Shodan API key as the `SHODAN_API_KEY` environment variable.
- This tool is meant for educational purposes only. Misuse of this tool is strictly prohibited.

## Dorks

- Zoomeye: `service:"freeswitch-event"`
- Shodan: `product:"FreeSWITCH mod_event_socket` or `port:8021 Content-Type: auth/request`

## Warning

This script is provided for educational and ethical testing purposes only. Using this script for malicious activities is strictly prohibited. The authors, Chocapikk and TrHacknon, are not responsible for any misuse or illegal activities.

## Authors

- Chocapikk
- TrHacknon
File Snapshot

[4.0K] /data/pocs/2e87a3289882c608499a7e7574e37e9498662b27 ├── [9.8K] exploit.py ├── [ 289] parser_zoomeye.py ├── [2.1K] README.md └── [ 51] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →