Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-33617 PoC — Parks Fiberlink 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Parks Fiberlink 操作系统命令注入漏洞 (CVE-2023-33617)
Description:An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2.1.14_X000 was found via the /boaform/admin/formPing target_addr parameter.
Readme
# CVE-2023-33617

Authenticated OS command injection vulnerability (CVE-2023-33617) in Parks FiberLink 210 routers running firmware version V2.1.14_X000. This tool utilizes the APIs of ZoomEye and Shodan to search for vulnerable targets and then attempts to exploit the command injection vulnerability.

## Prerequisites

- Python 3.x
- Install the required dependencies using the provided `requirements.txt` file: `pip install -r requirements.txt`

## Usage

1. Export the API keys for ZoomEye and Shodan as environment variables:
   - ZoomEye API key: `export ZOOMEYE_API_KEY=Your_Zoomeye_API_Key`
   - Shodan API key: `export SHODAN_API_KEY=Your_Shodan_API_Key`
2. Run the `exploiter.py` script with the desired options:

```bash
python exploiter.py --shodan --zoomeye --threads 10 --pages 2 --user admin --password parks --output vulnerable.txt
```

## Options

- `--shodan`: Use Shodan API for target search
- `--zoomeye`: Use ZoomEye API for target search
- `--threads`: Number of threads to use for concurrent exploitation (default: 100)
- `--pages`: Number of pages to search in ZoomEye or Shodan (default: 1)
- `--user`: Username for authentication (default: admin)
- `--password`: Password for authentication (default: parks)
- `--output`: Output file to store the list of vulnerable hosts (default: vulnerable.txt)

## Output

The tool will display the progress and results of the exploitation process. It will print the vulnerable hosts and their command output. Additionally, the list of vulnerable hosts will be saved in the specified output file.

## Disclaimer

This tool is intended for educational and ethical purposes only. The authors are not responsible for any misuse or damage caused by this tool. Use it at your own risk.

## Credits
Original Write-Up: [https://blog.gbrls.space/blog/cve-2023-33617-writeup/](https://blog.gbrls.space/blog/cve-2023-33617-writeup/)

File Snapshot

[4.0K] /data/pocs/cb9216a9c273c5b6e3cb090e2e085514e456c52a ├── [9.8K] exploit.py ├── [1.8K] README.md └── [ 83] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →