This exploit targets a denial-of-service vulnerability in freeSSHd 1.3.1 by sending a malformed SSH channel request packet with an improperly sized 'shell' string, causing the server to crash. The code includes a full SSH protocol implementation to craft and send the malicious packet.
Classification
Working Poc 95%
Target:
freeSSHd 1.3.1
Auth required
Prerequisites:
Valid user credentials configured on the freeSSHd server · Network access to the target server