Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-1709 PoC — Authentication bypass using an alternate path or channel

Source
Associated Vulnerability
Title:Authentication bypass using an alternate path or channel (CVE-2024-1709)
Description:ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
Description
A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability
Readme
# CVE-2024-1709
A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability

## Usage

create a "hosts.txt" file within the script's directory and include the hosts you intend to scan in the file.


## Follow me on social media:
* X: https://x.com/HussainMFathy
* LinkedIn: https://www.linkedin.com/in/0xsphinx



## Disclaimer
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.
File Snapshot

[4.0K] /data/pocs/4c1039e4a982173082fcd7371af01deaa80e4ef0 ├── [2.6K] CVE-2024-1709.py └── [ 675] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →