Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-2873 PoC — User authentication bypass in wolfSSH server

Source
Associated Vulnerability
Title:User authentication bypass in wolfSSH server (CVE-2024-2873)
Description:A vulnerability was found in wolfSSH's server-side state machine before versions 1.4.17. A malicious client could create channels without first performing user authentication, resulting in unauthorized access.
File Snapshot

[4.0K] /data/pocs/ef4acce04f4b28faa4812fd2afc16d9498c1b91f ├── [6.4K] cve_2024_2873_pentest.py ├── [2.6K] Dockerfile ├── [ 455] pyproject.toml ├── [ 254] rebuild-dropbear.sh ├── [4.0K] src │   └── [4.0K] controller │   ├── [4.0K] cves │   │   ├── [ 10K] cve_2024_2873.py │   │   └── [ 180] __init__.py │   ├── [ 981] env.py │   └── [2.3K] server.py ├── [ 896] start-dropbear.sh └── [4.0K] tasks ├── [1.1K] full_info.json ├── [1016] one_day.json └── [ 939] zero_day.json 5 directories, 12 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →