Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-10388 PoC — Open TFTP Server SP 格式化字符串错误漏洞

Source
Associated Vulnerability
Title:Open TFTP Server SP 格式化字符串错误漏洞 (CVE-2018-10388)
Description:Format string vulnerability in the logMess function in TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via format string sequences in a TFTP error packet.
Description
practice
File Snapshot

[4.0K] /data/pocs/53bf226eff2a86fa122a0860356dee0062a3fe0b ├── [4.0K] docker │   ├── [ 502] build.sh │   ├── [ 275] docker-compose.yml │   ├── [ 363] Dockerfile │   ├── [4.0K] share │   │   ├── [ 37] flag │   │   └── [ 749] start.py │   ├── [4.0K] source │   │   ├── [ 80] Makefile │   │   ├── [112K] opentftpd │   │   ├── [ 60K] opentftpd.cpp │   │   └── [4.5K] opentftpd.h │   ├── [4.0K] tmp │   │   └── [ 107] opentftp.ini │   └── [ 308] xinetd └── [4.0K] example ├── [ 553] 4.py ├── [ 504] 5.py ├── [1.4K] 6.py ├── [ 857] 7.py └── [1.9K] exp.py 5 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →