Delete CVE-2020-16139.md

Linting
This commit is contained in:
debifrank 2020-08-13 09:55:14 -04:00 committed by GitHub
parent d1afe60262
commit f6581b9518
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 0 additions and 30 deletions

View File

@ -1,30 +0,0 @@
## Vulnerable Application
1. Obtain a Cisco 7937G Conference Station.
2. Enable Web Access on the device (default configuration).
3. It has been observed that based on the firmware available from Cisco, all version are likely vulnerable.
## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/dos/cisco/CVE-2020-16139`
3. Do: `set RHOST 192.168.1.10`
4. Do: `run`
5. The conference station should become inoperable and then power cycle itself.
## Options
1. rhost (required) - Target address
## Scenarios
Because both successful and unsuccessful attacks result in the request timing out, there
is no way to be sure that the attack was completed. It is recommended to attempt a ping
to the device immediately afterward to verify device is offline/reseting.
```
[*] Starting server...
[*] 192.168.110.209 - Sending DoS packets. Stand by.
[*] 192.168.110.209 - DoS reset attack completed!
[*] Auxiliary module execution completed
```