Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5633 PoC — D-Link DI-524无线路由器跨站请求伪造漏洞

Source
Associated Vulnerability
Title:D-Link DI-524无线路由器跨站请求伪造漏洞 (CVE-2017-5633)
Description:Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.
Description
Exploit developed by me for CVE-2017-5633.
Readme
# Exploit-CVE-2017-5633
I like to code, not to do readme.md.
File Snapshot

[4.0K] /data/pocs/bfe4ec3e664164aee93648e941a213856b998b83 ├── [4.3K] exploitrouter524.py └── [ 61] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →