Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-0305 PoC — Guangzhou Yingke Electronic Technology Ncast Guest Login IPSetup.php information disclosure

Source
Associated Vulnerability
Title:Guangzhou Yingke Electronic Technology Ncast Guest Login IPSetup.php information disclosure (CVE-2024-0305)
Description:A vulnerability was found in Guangzhou Yingke Electronic Technology Ncast up to 2017 and classified as problematic. Affected by this issue is some unknown functionality of the file /manage/IPSetup.php of the component Guest Login. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249872.
Description
cve-2024-0305可用的exp
Readme
# cve-2024-0305exp
cve-2024-0305可用的exp,如需引用请转明出处,感谢!
## 0x01 产品背景
Ncast盈可视高清智能录播系统是广州盈可视电子科技有限公司的一款产品。该系统存在RCE漏洞,攻击者可以利用此漏洞执行任意命令能够利用该漏洞获取服务器权限,导致服务器沦陷。
## 0x02 漏洞范围
> Ncast 2007
> Ncast 2017
## 0x03 漏洞寻找
> FOFA: app="Ncast-产品"
## 0x04 使用方法
> python cve-2024-0305.py -u {YOUR TARGET} -p {TARGET PORT}
注:不带http://
## 0x05 其他事项
该脚本默认使用RCE命令为whoami,如需进一步使用可自行修改。
![1713410522433](https://github.com/jidle123/cve-2024-0305exp/assets/123531867/f327e2d2-bb75-461b-ae5f-2cd3052f0a34)

File Snapshot

[4.0K] /data/pocs/846fb0041aa8b2a289c1cb1523621cd26a133eab ├── [1.3K] cve-2024-0305.py └── [ 768] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →