Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-26878 PoC — Ruckus Networks Ruckus IoT 注入漏洞

Source
Associated Vulnerability
Title:Ruckus Networks Ruckus IoT 注入漏洞 (CVE-2020-26878)
Description:Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
Readme
# CVE-2020-26878

This is a modified version of the Ruckus exploit found at https://www.exploit-db.com/exploits/49110

Since the original exploit was written for Python 2, I tweaked it a little to make it work with Python 3.

Note: I am not responsible for any illegal use of this exploit. This is only for educational and testing purposes, with the goal of securing systems.
File Snapshot

[4.0K] /data/pocs/fc0235bd83f8676b13768d7f4100ca7df2ad391f ├── [2.8K] PoC.py └── [ 376] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →