目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2011-2523— vsftpd 操作系统命令注入漏洞

EPSS 94.27% · P100
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2011-2523 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
vsftpd 操作系统命令注入漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
vsftpd是一款用于类Unix系统的FTP(文件传输协议)服务器。 vsftpd 2.3.4版本(2011年6月30日至2011年7月3日期间下载)中存在安全漏洞,该漏洞源于软件中存在可以打开shell的后门。攻击者可利用该漏洞执行命令。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

神龙十问 — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

受影响产品

厂商产品影响版本CPE订阅
vsftpdvsftpd 2.3.4 downloaded between 20110630 and 20110703 -

二、漏洞 CVE-2011-2523 的公开POC

#POC 描述源链接神龙链接
1An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in pythonhttps://github.com/HerculesRD/vsftpd2.3.4PyExploitPOC详情
2vsftpd 2.3.4 Backdoor Exploithttps://github.com/nobodyatall648/CVE-2011-2523POC详情
3https://www.exploit-db.com/exploits/49757https://github.com/Gr4ykt/CVE-2011-2523POC详情
4Python exploit for vsftpd 2.3.4 - Backdoor Command Executionhttps://github.com/padsalatushal/CVE-2011-2523POC详情
5FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523https://github.com/MFernstrom/OffensivePascal-CVE-2011-2523POC详情
6Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)https://github.com/0xSojalSec/-CVE-2011-2523POC详情
7Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)https://github.com/0xSojalSec/CVE-2011-2523POC详情
8Nonehttps://github.com/XiangSi-Howard/CTF---CVE-2011-2523POC详情
9CVE-2011-2523 exploithttps://github.com/0xFTW/CVE-2011-2523POC详情
10Python exploit for vsftpd 2.3.4 - Backdoor Command Executionhttps://github.com/Lynk4/CVE-2011-2523POC详情
11Python exploit for vsftpd 2.3.4 - Backdoor Command Execution https://github.com/vaishnavucv/CVE-2011-2523POC详情
12A tool that exploits the CVE-2011-2523 vulnerability.https://github.com/chleba124/vsftpd-exploitPOC详情
13Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)https://github.com/4m3rr0r/CVE-2011-2523-pocPOC详情
14CVE-2011-2523 exploithttps://github.com/cowsecurity/CVE-2011-2523POC详情
15Nonehttps://github.com/Shubham-2k1/Exploit-CVE-2011-2523POC详情
16A basic script that exploits CVE-2011-2523https://github.com/Tenor-Z/SmileySploitPOC详情
17vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoChttps://github.com/sug4r-wr41th/CVE-2011-2523POC详情
18POC para CVE-2011-2523https://github.com/Fatalitysec/vsftpd_2.3.4_BackdoorPOC详情
19A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-ExploitPOC详情
20This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523)https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523-POC详情
21PoC CVE-2011-2523 https://github.com/Uno13x/CVE-2011-2523-PoCPOC详情
22PoC CVE-2011-2523 https://github.com/R4idB0Y/CVE-2011-2523-PoCPOC详情
23PoC CVE-2011-2523 https://github.com/0xB0y426/CVE-2011-2523-PoCPOC详情
24VsFTPd 2.3.4 Backdoor Command Executionhttps://github.com/NullBrunk/CVE-2011-2523POC详情
25CVE-2011-2523 vsftpd 2.3.4 exploithttps://github.com/Lychi3/vsftpd-backdoorPOC详情
26Vulnerability assessment and exploitation of vsftpd 2.3.4 (CVE-2011-2523) using Metasploit. Full report and proof of root access included.https://github.com/vedpakhare/vsftpd-234-vuln-reportPOC详情
27Nonehttps://github.com/madanokr001/CVE-2011-2523POC详情
28VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted. https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2011/CVE-2011-2523.yamlPOC详情
29Laboratorio técnico de ciberseguridad donde se realiza reconocimiento de red con Nmap y explotación de la vulnerabilidad CVE-2011-2523 (vsftpd 2.3.4) mediante Metasploit Framework. Proyecto académico orientado a demostrar habilidades en análisis de vulnerabilidades, uso de herramientas de pentesting y reporte técnico. https://github.com/JohanMV/explotacion-vsftpd-nmap_Laboratorio_1POC详情
30Exploit for CVE-2011-2523.https://github.com/lghost256/vsftpd234-exploitPOC详情
31Nonehttps://github.com/hklabCR/CVE-2011-2523POC详情
32 Python exploit for vsftpd 2.3.4 - Backdoor Command Execution https://github.com/krill-x7/CVE-2011-2523POC详情
33Nonehttps://github.com/cybermads/CVE-2011-2523POC详情
34A classic Exploit updated for vsftpd backdoor 2.3.4https://github.com/As9xm/BrokenDoor-CVE-2011-2523-POC详情
35Python exploit for vsftpd 2.3.4 - Backdoor Command Executionhttps://github.com/BolivarJ/CVE-2011-2523POC详情
36A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) in a controlled lab environment, demonstrating reconnaissance, exploitation with Metasploit, and establishing a reverse shell.https://github.com/seerat-fatima21/vsftpd-exploitPOC详情
37his project demonstrates the exploitation of the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) using Metasploitable 2 and Kali Linux with Metasploit. It includes reconnaissance, exploitation, and defensive measures, with a detailed report and lab setup for learning ethical hacking and security best practices.https://github.com/hajisthabegum/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-MetasploitPOC详情
38Explotacion de la version 2.3.4 de vsftpd automatizada https://github.com/avivyap/CVE-2011-2523POC详情
39Comprehensive Penetration Testing report and exploit chain for Metasploitable 2 focusing on CVE-2011-2523.https://github.com/KlyneZyro/Metasploitable2-VAPT-ReportPOC详情
40Full-lifecycle penetration test of a legacy Linux environment (Metasploitable 2) emulated on Apple Silicon. Demonstrating network reconnaissance, RCE via service backdoors (CVE-2011-2523), and cryptographic credential recovery.https://github.com/Mirza-22144/Vulnerability-Assessment-Exploitation-LabPOC详情
41vsftpd 2.3.4 (CVE-2011-2523) a critical vulnerability that leads to Reverse Root Shell. In this repo I will do a PoC how to exploit it step by step, Manually & Automatically (Python) for educational purposes.https://github.com/tshaq17/vsftpd-2.3.4---Backdoor-Command-ExecutionPOC详情
42Metasploitable 2 üzerinde vsftpd 2.3.4 (CVE-2011-2523) zafiyetinin istismarı ve sızma sonrası adımlarını içeren laboratuvar çalışması.https://github.com/Efehamzaa/Metasploit-Red-Pentest-LabPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2011-2523 的情报信息

Please 登录 to view more intelligence information

V. Comments for CVE-2011-2523

匿名用户
2026-01-15 06:08:57

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


发表评论