Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work. | https://github.com/f3d0x0/GPON | POC Details |
| 2 | Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan. | https://github.com/649/Pingpon-Exploit | POC Details |
| 3 | Exploit loader for Remote Code Execution w/ Payload on GPON Home Gateway devices (CVE-2018-10562) written in Python. | https://github.com/Choudai/GPON-LOADER | POC Details |
| 4 | Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. | https://github.com/c0ld1/GPON_RCE | POC Details |
| 5 | Exploit for CVE-2018-10562 | https://github.com/ATpiu/CVE-2018-10562 | POC Details |
| 6 | Python exploit for Remote Code Executuion on GPON home routers (CVE-2018-10562). Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work. | https://github.com/ExiaHan/GPON | POC Details |
| 7 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 | https://github.com/mr-won/backdoor.mirai.helloworld | POC Details |
| 8 | Dasan GPON home routers are susceptible to command injection which can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-10562.yaml | POC Details |
| 9 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 | https://github.com/user20252228/backdoor.mirai.helloworld | POC Details |
| 10 | backdoor.mirai.helloworld cve2018-20561, cve-2018-10562 해킹 | https://github.com/tpdlshdmlrkfmcla/backdoor.mirai.helloworld | POC Details |
No public POC found.
Login to generate AI POCNo comments yet