# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work. | https://github.com/f3d0x0/GPON | POC详情 |
2 | Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan. | https://github.com/649/Pingpon-Exploit | POC详情 |
3 | Exploit loader for Remote Code Execution w/ Payload on GPON Home Gateway devices (CVE-2018-10562) written in Python. | https://github.com/Choudai/GPON-LOADER | POC详情 |
4 | Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. | https://github.com/c0ld1/GPON_RCE | POC详情 |
5 | Exploit for CVE-2018-10562 | https://github.com/ATpiu/CVE-2018-10562 | POC详情 |
6 | Python exploit for Remote Code Executuion on GPON home routers (CVE-2018-10562). Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work. | https://github.com/ExiaHan/GPON | POC详情 |
7 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 | https://github.com/mr-won/backdoor.mirai.helloworld | POC详情 |
8 | Dasan GPON home routers are susceptible to command injection which can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-10562.yaml | POC详情 |
9 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 | https://github.com/user20252228/backdoor.mirai.helloworld | POC详情 |