Share
## https://sploitus.com/exploit?id=8228274D-C019-53C7-8855-8A144D672C1E
# CVE-2023-33105: Transient DOS in WLAN Host and Firmware

## Overview

This repository contains the exploit code for CVE-2023-33105, a vulnerability identified in Qualcomm devices. The exploit leverages authentication frames to perform a denial of service (DoS) attack on a target access point (AP) by sending a large number of open authentication frames with an invalid transaction sequence number.

- **CVE ID**: [CVE-2023-33105](https://nvd.nist.gov/vuln/detail/CVE-2023-33105)
- **Qualcomm Security Bulletin**: [March 2024 Bulletin](https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2024-bulletin.html)

## Requirements

- Python 3.x
- Scapy
- Termcolor
- Airodump-ng
- A wireless network adapter capable of injection

## Installation

To install the necessary Python libraries, run:

```bash
pip install -r requirements.txt
```

## Files

- `config.py`: Configuration file for setting target MAC addresses and parameters.
- `exploit_v2.py`: Main exploit script.

## Configuration

Before running the exploit, update the `config.py` file with the target MAC addresses and other parameters.

```python
# config.py

# MAC address of the station (client)
sta_target = 'XX:XX:XX:XX:XX:XX'  # change this

# MAC address of the access point (AP)
ap_target = 'YY:YY:YY:YY:YY:YY'  # change this

# Number of frames to send
spray = 500

# Interval for checking if the BSSID is still up (in seconds)
check_interval = 60
```

## Usage

To run the exploit, follow these steps:

1. Ensure your wireless network adapter is in monitor mode. You can enable monitor mode using the following command:

```bash
sudo ip link set wlan0 down
sudo iw dev wlan0 set type monitor
sudo ip link set wlan0 up
```

2. Execute the exploit script:

```bash
python exploit_v2.py
```

The script will send a large number of open authentication frames with invalid transaction sequence numbers to the target AP, causing a transient DoS.

## FAQ

### What is CVE-2023-33105?

CVE-2023-33105 is a vulnerability in Qualcomm devices that allows a transient DoS in WLAN Host and Firmware when a large number of open authentication frames are sent with an invalid transaction sequence number.

### What are the requirements to run this exploit?

You need Python 3.x, Scapy, Airodump-ng, and a wireless network adapter capable of injection.

### Is it legal to use this exploit?

Unauthorized use of this script against networks without permission is illegal. This code is provided for educational purposes only.

## References

- [CVE-2023-33105](https://nvd.nist.gov/vuln/detail/CVE-2023-33105)
- [Qualcomm Security Bulletin](https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2024-bulletin.html)