Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-3962 PoC — 多款Meinberg产品基于栈的缓冲区溢出漏洞

Source
Associated Vulnerability
Title:多款Meinberg产品基于栈的缓冲区溢出漏洞 (CVE-2016-3962)
Description:Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.
Description
CVE-2016-3962-Exploit
Readme
CVE-2016-3962, CVE-2016-3989 POC Exploit
=====

This is a proof of concept exploit for version V5.30p of the web configuration interface for Meinberg NTP Time Server. This exploit also utilitizes
CVE-2016-3989 to escalate to the root user.

More details about the vulnerabilities can be found at:
https://www.securifera.com/advisories/cve-2016-3962-3988-3989/
https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03
File Snapshot

[4.0K] /data/pocs/a8ad079846ab98b429925986a3099d6c5777ff20 ├── [5.8K] meinburg_poc.py └── [ 414] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →