Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-5767 PoC — Tenda AC15 输入验证漏洞

Source
Associated Vulnerability
Title:Tenda AC15 输入验证漏洞 (CVE-2018-5767)
Description:An issue was discovered on Tenda AC15 V15.03.1.16_multi devices. A remote, unauthenticated attacker can gain remote code execution on the device with a crafted password parameter for the COOKIE header.
Description
An implementation of a proof-of-concept for CVE-2018-5767 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5767)
Readme
# CVE-2018-5767-AC9
An implementation of a proof-of-concept for CVE-2018-5767 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5767)

    The following is an actualization of CVE-2018-5767, a vulnerability which
    exploits an unguarded call to sscanf that occurs when parsing the 'Cookie'
    header for a password. The vulnerability was initially discovered in, and
    reported for, the AC15 model router, but has been rediscovered in several
    different routers in this product line. This implementation sees it exploit the
    model AC9, which is not presently covered by any CVE. A memory address for the
    base of libc known to work on this router is 0x2ad6d000.

    See the following for more information:
    https://www.cve.org/CVERecord?id=CVE-2018-5767
    https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/
    https://www.klogixsecurity.com/scorpion-labs-blog/sometimes-exploits-need-patches-too-working-through-a-change-of-address

    usage: CVE-2018-5767-AC9.py [-h] [-t TARGET] [-p PORT] [-l LIBC] [-c COMMAND]
                                [-v] [-a]

    options:
      -h, --help            show this help message and exit
      -t TARGET, --target TARGET
                            target URL or IP address to throw against
      -p PORT, --port PORT  target port to throw against (default = 80)
      -l LIBC, --libc LIBC  estimated base address of libc (default = 0x2ad6d000)
      -c COMMAND, --command COMMAND
                            command(s) to be run on target (default = exit)
      -v, --verbose         increase output verbosity (currently not implemented)
      -a, --about           print information about this vulnerability then exit
File Snapshot

[4.0K] /data/pocs/04a1c60e324f9f8265d1fe317143be5685af58d9 ├── [3.8K] CVE-2018-5767-AC9.py ├── [1.0K] LICENSE └── [1.7K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →