Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-31290 PoC — Trust Wallet Core 安全特征问题漏洞

Source
Associated Vulnerability
Title:Trust Wallet Core 安全特征问题漏洞 (CVE-2023-31290)
Description:Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023. This occurs because the mt19937 Mersenne Twister takes a single 32-bit value as an input seed, resulting in only four billion possible mnemonics. The affected versions of the browser extension are 0.0.172 through 0.0.182. To steal funds efficiently, an attacker can identify all Ethereum addresses created since the 0.0.172 release, and check whether they are Ethereum addresses that could have been created by this extension. To respond to the risk, affected users need to upgrade the product version and also move funds to a new wallet address.
Description
(CVE-2023-31290) Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023.
File Snapshot

[4.0K] /data/pocs/b888538505fbb876bdbbda677f71c1ad323ce796 ├── [ 16K] LICENSE ├── [ 72] Makefile ├── [ 169] requirements.txt ├── [4.0K] tests │   ├── [ 0] __init__.py │   └── [ 249] test_mnemonic.py └── [4.0K] trustwasm ├── [ 114] __init__.py ├── [ 466] mnemonic.cpp ├── [1.4K] mnemonic.py └── [ 13K] mnemonic.txt 2 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →