Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-6546 PoC — AMD驱动程序安装包和Gaming Evolved产品plays.tv服务安全漏洞

Source
Associated Vulnerability
Title:AMD驱动程序安装包和Gaming Evolved产品plays.tv服务安全漏洞 (CVE-2018-6546)
Description:plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, executes code at a user-defined (local or SMB) path as SYSTEM when the execute_installer parameter is used in an HTTP message. This occurs without properly authenticating the user.
Description
CVE-2018-6546-Exploit
Readme
CVE-2018-6546 POC Exploit
=====

This is a proof of concept exploit for version 1.27.5.0 and prior of the Plays.tv service(plays_service.exe).

More details about the vulnerabilities can be found at:

https://www.securifera.com/advisories/cve-2018-6546/

https://www.securifera.com/blog/2018/04/15/amd-gaming-evolved-raptr-plays-tv-remote-file-execution/
File Snapshot

[4.0K] /data/pocs/13428964ddbda798763b3f6d8683b2190512a5e6 ├── [2.5K] plays_service_poc.py └── [ 354] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →