## https://sploitus.com/exploit?id=48FAED93-C711-59A0-B81E-A65D4463C7F0
# Spill
Utility to quickly scan over a signle IP / CIDR to search for OpenPrinting CVE 2024-47176 on UDP 631
This utility is quick and ugly - but could be useful to some people.
Exploit has been left out purposefully as this is more designed to scan and provide awareness to users.
## Build Project
```
go build .
```
## Usage
```
Usage of ./spill:
-cidr string
CIDR block for network scanning
-dest string
Destination IP address
-destport string
Destination UDP port (default "12345")
-ip string
Target IP address
-port string
Target UDP port (default "631")
```
## Example (single IP)
```
go run main.go -ip <target-ip> -port 631 -dest <your listening ip> -destport <your listening port>
OR
./spill -ip <target-ip> -port 631 -dest <your listening ip> -destport <your listening port>
```
## Example (CIDR)
```
go run main.go -cidr <target-range> -port 631 -dest <your listening ip> -destport <your listening port>
OR
./spill -cidr <target-range> -port 631 -dest <your listening ip> -destport <your listening port>
```
## Example Output
```zsh
βββ(kaliγΏkali-raspberry-pi)-[~/spill]
ββ$ ./spill -cidr 10.1.80.0/24 -dest 10.110.123.74 -destport 9003
. .
.. . *.
- -_ _-__-0oOo
_-_ -__ -||||)
______||||______
~~~~~~~~~~^""' Spill
2024/09/27 13:55:37 Starting HTTP server on port 9003...
Packet Progress 100% |ββββββββββββββββββββββββββββββββββββββββ|
2024/09/27 13:55:37 Received POST request: 10.1.80.89:56952
2024/09/27 13:55:37 Received POST request: 10.1.80.85:37606
```