# D-Link NAS Command Execution Exploit

This Python script exploits a vulnerability (CVE-2024-3273) in D-Link NAS devices, allowing arbitrary command execution. It leverages the vulnerability to execute commands remotely on the affected devices.

## Features
- Executes arbitrary commands on D-Link NAS devices.
- Supports both single host and multiple hosts from a file.
- Concurrent execution of commands for improved efficiency.
- Option to specify the number of threads for concurrent execution.
- Option to specify a custom command to execute (default: `id`).
- Prints colored output for easy identification of vulnerable hosts and responses.

## Requirements
- Python 3.10
- Requests library (2.26.0)
- Colorama library (0.4.6)

## Usage

<div align="center">
  <img src="" alt="Screenshot_4">

 python [-h] [-u URL] [-f FILENAME] [-o OUTPUT] [-t THREAD] [-c COMMAND]
- `-u, --url`: Specify the URL/IP of the target host.
- `-f, --filename`: Provide the path to a file containing a list of hosts.
- `-o, --output`: Specify the path to save vulnerable hosts.
- `-t, --thread`: Number of threads for concurrent execution (default: 5).
- `-c, --command`: Specify the command to run (default: `id`).

## References
- **adhikara13**

## Disclaimer
This script is for educational purposes only. Use it at your own risk.