Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-43035 PoC — Fonoster 安全漏洞

Source
Associated Vulnerability
Title:Fonoster 安全漏洞 (CVE-2024-43035)
Description:Fonoster 0.5.5 before 0.6.1 allows ../ directory traversal to read arbitrary files via the /sounds/:file or /tts/:file VoiceServer endpoint. This occurs in serveFiles in mods/voice/src/utils.ts. NOTE: serveFiles exists in 0.5.5 but not in the next release, 0.6.1.
Description
Proof-of-concept exploit for Fonoster LFI vulnerability (CVE-2024-43035)
Readme
# CVE-2024-43035 - Fonoster LFI Proof of Concept

This repository contains a Proof of Concept (PoC) script demonstrating a [Local File Inclusion vulnerability in Fonoster](https://zeropath.com/blog/fonoster-voiceserver-lfi-vulnerability). **This tool is for educational and authorized testing purposes only.**

## Usage

### Read Local File
To retrieve a local file from the server:
```
python3 fonoster_lfi_poc.py --url <fonoster_server_url> --path <file_path_to_retrieve>
```

Example:

```
python3 fonoster_lfi_poc.py --url http://example.com --path "../../../etc/passwd"
```
z
File Snapshot

[4.0K] /data/pocs/5d01b18f811aa85f1497b342ab6f9f4ad21a8cb3 ├── [1.3K] fonoster_lfi_poc.py └── [ 581] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →