Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-34527 PoC — D-Link DSL-3782 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:D-Link DSL-3782 操作系统命令注入漏洞 (CVE-2022-34527)
Description:D-Link DSL-3782 v1.03 and below was discovered to contain a command injection vulnerability via the function byte_4C0160.
File Snapshot

[4.0K] /data/pocs/eae491358061c6c95183691c9d955233700686c1 ├── [4.0K] CVE-2022-34527_D-Link_DSL-3782_Router_command_injection.assets │   ├── [113K] 2023-04-15-17-02-35.png │   ├── [ 16K] 2023-04-15-17-03-29.png │   ├── [285K] 2023-04-15-17-05-25.png │   ├── [ 45K] 2023-04-15-17-06-06.png │   ├── [ 63K] 2023-04-15-17-14-23.png │   ├── [ 92K] 2023-04-15-17-15-42.png │   ├── [ 15K] 2023-04-16-10-33-24.png │   ├── [ 28K] 2023-04-16-10-33-45.png │   ├── [ 16K] 2023-04-16-11-20-30.png │   ├── [ 64K] 2023-04-16-11-21-00.png │   ├── [ 14K] 2023-04-16-11-43-04.png │   ├── [ 34K] 2023-04-16-11-45-57.png │   ├── [ 73K] 2023-04-16-11-46-44.png │   ├── [ 48K] 2023-04-16-11-48-40.png │   ├── [ 37K] 2023-04-16-11-52-26.png │   ├── [130K] 2023-04-16-13-16-46.png │   └── [158K] 2023-04-18-12-13-46.png ├── [4.6K] CVE-2022-34527_D-Link_DSL-3782_Router_command_injection.md ├── [ 12M] DSL-3782_A1_EU_1.03beta_12132017.bin └── [1.8K] v1.03.py 1 directory, 20 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →