Test CVE-2018-15473 exploit on Shodan IPHere is a simple script to test CVE-2018-15473 exploit on 100 IP addresses referenced by Shodan. Usernames tested are contained in users.txt
The file that has to be executed is main.py. It works on Linux and you have to get your own API key from www.shodan.io
The results only appear on the standard output. Expect the IP list which is save under ips.txt.
CVE attack forked from https://github.com/Sait-Nuri/CVE-2018-15473
Make sure you have the libraries argparse, shodan and paramiko.
You also can try the following command: chmod +x cve.py
The purpose of this project is purely educational.
[4.0K] /data/pocs/6ec2ce7f3137bcce034b132d3e726626db7ba875
├── [3.1K] cve.py
├── [ 579] main.py
├── [ 599] README.md
└── [ 244] users.txt
0 directories, 4 files