Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18371 PoC — Xiaomi Mi WiFi R3G 路径遍历漏洞

Source
Associated Vulnerability
Title:Xiaomi Mi WiFi R3G 路径遍历漏洞 (CVE-2019-18371)
Description:An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.
Description
A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to versi…
File Snapshot

[4.0K] /data/pocs/81b5338633a33aa3b2ee23f4120b657eb5473730 ├── [1.9K] arbitrary_file_read_vulnerability.py ├── [1.8K] remote_command_execution_vulnerability.py ├── [4.0K] report │   ├── [ 88K] 1.png │   ├── [ 34K] 2.png │   ├── [106K] 3.png │   └── [ 16K] report.md ├── [ 9] requirements.txt └── [1.8K] template.xml 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →