UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy

UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy Remember UPnProxy?
Flawed implementations of UPnP allow external attackers to use vulnerable devices as proxies without any authentication. Such devices are vulnerable to UPnProxy. Various malicious actors have been using this vulnerability to commit crimes.
During penetration tests, I have multiple times encountered such vulnerable devices on the public IP address space of the clients. No suitable tooling exists to exploit such devices, so I decided to create some.

Article Link: UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy