Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work. | https://github.com/f3d0x0/GPON | POC Details |
| 2 | Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan. | https://github.com/649/Pingpon-Exploit | POC Details |
| 3 | Exploit loader for Remote Code Execution w/ Payload on GPON Home Gateway devices (CVE-2018-10562) written in Python. | https://github.com/Choudai/GPON-LOADER | POC Details |
| 4 | Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. | https://github.com/c0ld1/GPON_RCE | POC Details |
| 5 | Exploit for CVE-2018-10562 | https://github.com/ATpiu/CVE-2018-10562 | POC Details |
| 6 | Python exploit for Remote Code Executuion on GPON home routers (CVE-2018-10562). Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work. | https://github.com/ExiaHan/GPON | POC Details |
| 7 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 | https://github.com/mr-won/backdoor.mirai.helloworld | POC Details |
| 8 | Dasan GPON home routers are susceptible to command injection which can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-10562.yaml | POC Details |
| 9 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 | https://github.com/user20252228/backdoor.mirai.helloworld | POC Details |
| 10 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 해킹 | https://github.com/tpdlshdmlrkfmcla/backdoor.mirai.helloworld | POC Details |
No public POC found.
Login to generate AI POC| CVE-2018-10747 | D-Link DSL-3782 缓冲区错误漏洞 | |
| CVE-2018-9154 | JasPer 输入验证错误漏洞 | |
| CVE-2018-10251 | 多款Sierra Wireless产品安全漏洞 | |
| CVE-2018-10229 | GPU memory模块安全漏洞 | |
| CVE-2017-15043 | 多款Sierra Wireless产品安全漏洞 | |
| CVE-2013-2233 | Ansible 安全漏洞 | |
| CVE-2012-5628 | gofer 安全漏洞 | |
| CVE-2011-0704 | Red Hat 389 Directory Server 安全漏洞 | |
| CVE-2018-10740 | Axublog 安全漏洞 | |
| CVE-2018-10746 | D-Link DSL-3782 缓冲区错误漏洞 | |
| CVE-2018-10722 | Cylance CylancePROTECT 安全漏洞 | |
| CVE-2018-10748 | D-Link DSL-3782 缓冲区错误漏洞 | |
| CVE-2018-10749 | D-Link DSL-3782 缓冲区错误漏洞 | |
| CVE-2018-10750 | D-Link DSL-3782 缓冲区错误漏洞 | |
| CVE-2018-10739 | 2345 Security Guard 安全漏洞 | |
| CVE-2018-10733 | libgxps 缓冲区错误漏洞 | |
| CVE-2018-10726 | Datenstrom Yellow 跨站脚本漏洞 | |
| CVE-2018-10561 | Dasan GPON家庭路由器安全漏洞 | |
| CVE-2018-10641 | D-Link DIR-601 安全漏洞 |
No comments yet