Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-2169 PoC — Implementations of UDP application protocols are susceptible to network loops and denial of service

Source
Associated Vulnerability
Title:Implementations of UDP application protocols are susceptible to network loops and denial of service (CVE-2024-2169)
Description:Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
Description
This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.
Readme
# G3-Loop-DoS
Python Script for Automated Vulnerability Detection of Loop DoS and CVE-2024-2169

Description:

This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.

Key Features:

Efficient Scanning: Scans a range of IP addresses and ports associated with vulnerable protocols.
Multi-protocol Support: Supports protocols like NTP, DNS, and SNMP, with options for customization.
Custom Payload: Allows users to define custom payloads for testing specific protocol vulnerabilities.
Adjustable Parameters: Lets users adjust response timeout and number of threads to optimize the scan.
Detailed Results: Provides clear information about the response of each system tested.
Ethical Usage:

It is crucial to use this tool responsibly and ethically. It should never be used on targets without proper authorization. Its use is recommended only in controlled environments, such as for educational activities or authorized security testing.

How to Use:

Using the script is straightforward. Here's a basic example:

Python
python cve_scanner.py

# Set target as the 192.168.1.0/24 network
(G3-Loop-DoS) set_target 192.168.1.0/24

# Start the scan
(G3-Loop-DoS) scan
File Snapshot

[4.0K] /data/pocs/9ff511d139e1bee63b4f4db637b0fe0763e4d38e ├── [2.9K] G3-Loop-DoS-EN.py ├── [5.8K] G3-Loop-DoS.py └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →