Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8958 PoC — Guangzhou 1GE ONU V2801RW和V2804RGW 安全漏洞

Source
Associated Vulnerability
Title:Guangzhou 1GE ONU V2801RW和V2804RGW 安全漏洞 (CVE-2020-8958)
Description:Guangzhou 1GE ONU V2801RW 1.9.1-181203 through 2.9.0-181024 and V2804RGW 1.9.1-181203 through 2.9.0-181024 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the boaform/admin/formPing Dest IP Address field.
Description
Proof of concept for arbitrary OS command execution on Guangzhou/V-SOL 1GE ONU devices (CVE-2020-8958)
Readme
A proof of concept for CVE-2020-8958 written in Python. The script will return the contents of `/etc/passwd` if successful.

## CVE-2020-8958
Guangzhou 1GE ONU V2801RW 1.9.1-181203 through 2.9.0-181024 and V2804RGW 1.9.1-181203 through 2.9.0-181024 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the boaform/admin/formPing Dest IP Address field. 

## Requirements
- Python 3.X
- bs4 

## Usage
```python poc.py <IP_ADDR>```
File Snapshot

[4.0K] /data/pocs/c75aca473e4984d3b4ce0625c5f4fb305649b16b ├── [1.9K] poc.py └── [ 469] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →