Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-16898 PoC — Windows TCP/IP Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows TCP/IP Remote Code Execution Vulnerability (CVE-2020-16898)
Description:<p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.</p> <p>To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer.</p> <p>The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.</p>
Description
Zeek detection for CVE-2020-16898-"Bad Neighbor"
File Snapshot

[4.0K] /data/pocs/7d7a5bd201334e916582955b23fff797ddf3e2b1 ├── [1.5K] COPYING ├── [1.3K] README.rst ├── [4.0K] scripts │   ├── [1.9K] CVE-2020-16898-Bad-Neighbor.zeek │   └── [ 41] __load__.zeek ├── [4.0K] tests │   ├── [4.0K] Baseline │   │   └── [4.0K] CVE-2020-16898-Bad-Neighbor.CVE-2020-16898-Bad-Neighbor │   │   └── [ 840] notice.log │   ├── [ 554] btest.cfg │   ├── [4.0K] CVE-2020-16898-Bad-Neighbor │   │   └── [ 127] CVE-2020-16898-Bad-Neighbor.zeek │   ├── [ 15] Makefile │   └── [4.0K] Traces │   ├── [ 118] esnet-scapy_malicious_rdnss.pcap │   └── [ 244] esnet-scapy_nonmalicious_rdnss.pcap └── [ 135] zkg.meta 6 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →