Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-1651 PoC — Torrentpier 2.4.1 - RCE

Source
Associated Vulnerability
Title:Torrentpier 2.4.1 - RCE (CVE-2024-1651)
Description:Torrentpier version 2.4.1 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to insecure deserialization.
Readme
# CVE-2024-1651
This CVE was discovered by Carlos Bello from the Fluid Attack Offensive Team. The finding discusses Insecure Object Deserialization to obtain RCE (Remote Code Execution). Here, I have created a faster and easier-to-use PoC (Proof of Concept). Therefore, if anyone wants to reproduce the finding, they can use this as a reference example.

# Preview
![image](https://github.com/sharpicx/CVE-2024-1651-PoC/assets/44630640/db60cb47-3992-4bfd-a177-925cec06ddc4)


File Snapshot

[4.0K] /data/pocs/bddb39f6cdbbec16ddf06ea55a3307b92dcaad34 ├── [4.2K] exploit.py ├── [1.0K] LICENSE └── [ 476] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →