Share
## https://sploitus.com/exploit?id=48FAED93-C711-59A0-B81E-A65D4463C7F0
# Spill

Utility to quickly scan over a signle IP / CIDR to search for OpenPrinting CVE 2024-47176 on UDP 631

This utility is quick and ugly - but could be useful to some people.

Exploit has been left out purposefully as this is more designed to scan and provide awareness to users.

## Build Project

```
go build .
```

## Usage

```
Usage of ./spill:
  -cidr string
    	CIDR block for network scanning
  -dest string
    	Destination IP address
  -destport string
    	Destination UDP port (default "12345")
  -ip string
    	Target IP address
  -port string
    	Target UDP port (default "631")
```

## Example (single IP)

```
go run main.go -ip <target-ip> -port 631 -dest <your listening ip> -destport <your listening port>
OR
./spill -ip <target-ip> -port 631 -dest <your listening ip> -destport <your listening port>
```

## Example (CIDR)

```
go run main.go -cidr <target-range> -port 631 -dest <your listening ip> -destport <your listening port>
OR
./spill -cidr <target-range> -port 631 -dest <your listening ip> -destport <your listening port>
```

## Example Output

```zsh
β”Œβ”€β”€(kaliγ‰Ώkali-raspberry-pi)-[~/spill]
└─$ ./spill -cidr 10.1.80.0/24 -dest 10.110.123.74 -destport 9003

	  . .
	  .. . *.
- -_ _-__-0oOo
 _-_ -__ -||||)
    ______||||______
~~~~~~~~~~^""' Spill

2024/09/27 13:55:37 Starting HTTP server on port 9003...
Packet Progress 100% |β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ|
2024/09/27 13:55:37 Received POST request: 10.1.80.89:56952
2024/09/27 13:55:37 Received POST request: 10.1.80.85:37606
```