## https://sploitus.com/exploit?id=9DB4B6B1-3FB0-5827-B554-3F3779D23B09
# CVE-2024-47176 Vulnerability Scanner for CUPS
A simple tool to scan systems running **CUPS (Common Unix Printing System)** for the **CVE-2024-47176** vulnerability. This vulnerability can lead to remote code execution (RCE) through the **Internet Printing Protocol (IPP)** on port 631.
## Features
- **Automated Scanning**: Sends crafted UDP packets to detect vulnerable CUPS instances.
- **Multi-threaded Scanning**: Efficiently scans multiple IP addresses simultaneously.
- **Callback Logging**: Logs responses from vulnerable systems via a callback server.
## Installation
1. Clone the repository:
```bash
git clone https://github.com/your-username/CVE-2024-47176-scanner.git
## Usage
Run the scanner with the following command:
```bash
python3 CVE-2024-47176.py <HOST_CALLBACK> <FILE_INPUT>
```
- `<HOST_CALLBACK>`: The URL or IP of your callback server.
- `<FILE_INPUT>`: A text file containing a list of target IP addresses, one per line.
### Example
```bash
python3 CVE-2024-47176.py HOST_CALLBACK FILE_INPUT
```