Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-2075 PoC — UnrealIRCd 后门未授权访问漏洞

Source
Associated Vulnerability
Title:UnrealIRCd 后门未授权访问漏洞 (CVE-2010-2075)
Description:UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
Description
Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075
Readme
# UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075
# Usage
usage: IRC_BackDoorCommandExecution.py [-h] target_host target_port attacker_host attacker_port
File Snapshot

[4.0K] /data/pocs/3d301a8a8a2f3302fd73a06c976a6a7ebfc26d00 ├── [2.4K] IRC_BackDoorCommandExecution.py ├── [ 34K] LICENSE └── [ 272] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →