## https://sploitus.com/exploit?id=F5502B30-710E-5D69-B67C-937F75899289
CVE-2024-47176 Scanner
===
Evilsocket's PoC for CVE-2024-47176, trimmed and turned into a scanner. I literally opened it in vim and held down the d key.
Read his research [here](https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/). This script just sends the initial UDP packet to port 631 and triggers an http callback, signalling a vulnerable host.
Usage:
```
# clone the repo
git clone https://github.com/tonyarris/CVE-2024-47176-Scanner && cd CVE-2024-47176-Scanner/
# set up a virtualenv
python3 -m venv venv && source venv/bin/activate
# install ippserver
pip3 install ippserver
# set up an http listener, e.g. on app.interactsh.com or with Burp Collaborator
# prepare an input list of IPv4 addresses, one per line
# run
python3 scan.py your.callback-server.com input-list.txt
```
See your results on your callback server:
![results](image.png)