Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38063 PoC — Windows TCP/IP Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063)
Description:Windows TCP/IP Remote Code Execution Vulnerability
Description
potential memory corruption vulnerabilities in IPv6 networks.
Readme
# IPv6 Vulnerability Packet Sender for Memory Corruption
## CVE-2024-38063
This Python script is designed to send crafted packets to trigger potential memory corruption vulnerabilities `CVE-2024-38063`. It utilizes the Scapy library to create and send IPv6 packets, optionally using specified MAC addresses. The script can handle multiple network interfaces.

## Features

- Send crafted IPv6 packets with optional Interface headers.
- Configure destination IP and optionally MAC address.
- Specify the number of tries and batches for packet sending.
- Supports multiple network interfaces for packet dispatch.

## Requirements

- Python 3.x
- Scapy: You can install Scapy using pip:
  ```bash
  pip install scapy
  ```

## Usage

To use this script, you will need to provide several command-line arguments. Here is how to run the script with the required options:

```bash
python cve-2024-38063.py --iface "eth0,eth1" --ip_addr "2001:db8::1" --mac_addr "00:1A:2B:3C:4D:5E" --num_tries 20 --num_batches 20
```

### Arguments

- `--iface`: A comma-separated list of interfaces to use for sending packets. This argument is required.
- `--ip_addr`: The destination IPv6 address to which the packets will be sent. This argument is required.
- `--mac_addr`: The destination MAC address. This is optional; if omitted, no Ethernet header will be added.
- `--num_tries`: The number of tries per batch. Defaults to 20.
- `--num_batches`: The number of batches of tries. Defaults to 20.

### Example

Here is an example command that uses two interfaces to send packets:

```bash
python packet_sender.py --iface "eth0,eth1" --ip_addr "2001:db8::1" --mac_addr "00:1A:2B:3C:4D:5E" --num_tries 30 --num_batches 10
```

This will send packets to the specified IP address with the specified MAC address over `eth0` and `eth1`, with 30 tries per batch and 10 batches in total.

## Author

- Aung Myat Thu aka `w01f`

## Acknowledgments

- Thanks to the Scapy development team for providing such a powerful tool.
- Thanks to `ynwarcs` for idea
File Snapshot

[4.0K] /data/pocs/36ac484edb9bc66566d4ae56d9917929dc1cd382 ├── [2.2K] cve-2024-38063.py └── [2.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →