# Excploit Title: Microtik SSH Daemon 6.44.3 - Denial of Service (PoC) # Author: Hosein Askari # Date: 2020-03-18 # Vendor Homepage: https://mikrotik.com/ # Model: hAP lite # Processor architecture: smips # Affected Version: through 6.44.3 # CVE: N/A #Description: An uncontrolled resource consumption vulnerability in SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections with SIGPIPE signal(SIGPIPE is the "broken pipe" signal, which is sent to a process when it attempts to write to a pipe whose read end has closed or when it attempts to write to a socket that is no longer open for reading. The default action is to terminate the process) and cause a reboot via connect and write system calls because of uncontrolled resource management. #details: The issue reported in 02/25/2020 to the Mikrotik First response by Mikrotik in 02/26/2020 The additional information about exploit and PoC vi...