POC and EXP for CVE-2023-35085PS: All the scripts are achieved by Gemini 2.5 pro and CLaude 3.7. It may doesn't work well, because I don't know how to use the api "/mifs/rest/api/v2/command/exec", the same as the AIs, who pretented that they know it very well.
[4.0K] /data/pocs/2b2d4d4b0d3cb9307db8cded558c1835d3204128
├── [ 12K] EXP_reverse_shell-CVE-2023-35085.py
├── [ 14K] EXP_webshell-CVE-2023-35085.py
├── [3.8K] POC-CVE-2023-35085.py
└── [ 231] README.md
0 directories, 4 files