Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0796 PoC — 微软 Microsoft SMBv3 缓冲区错误漏洞

Source
Associated Vulnerability
Title:微软 Microsoft SMBv3 缓冲区错误漏洞 (CVE-2020-0796)
Description:A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
Description
Lightweight PoC and Scanner for CVE-2020-0796 without authentication.
Readme
# CVE-2020-0796

An even more simple PoC and Scanner for CVE-2020-0796, as it uses static packets. There is a protection to prevent accidental usage on public IPs (don't do that) and an on/off switch to flick crashing. Only requires vanilla Python 3!

Scan mode:
```
python3 poc-and-scan.py 10.0.0.15 N
```

Scan+Crash mode:
```
python3 poc-and-scan.py 10.0.0.15 Y
```

Output:
```
SMB v311 with LZNT1 detected.
Sending malformed packet per user request!
```

## License
Licensed under the WTFPL license.
File Snapshot

[4.0K] /data/pocs/e8f82ef19e360e9076083e68d12e30f5879be051 ├── [ 484] LICENSE-WTFPL ├── [2.0K] poc-and-scan.py └── [ 505] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →