# N/A
## 概述
MikroTik RouterOS 6.42及之前的版本中存在一个目录遍历漏洞,该漏洞允许未认证的远程攻击者读取任意文件,以及允许认证的远程攻击者写入任意文件。
## 影响版本
- 版本包括 6.42 及之前的所有版本
## 细节
- 此漏洞存在于WinBox界面中。
- 由于目录遍历漏洞的存在,未认证的攻击者可以读取任意文件。
- 认证的攻击者可以利用此漏洞写入任意文件。
## 影响
- 未认证的攻击者可以读取设备上的敏感文件。
- 认证的攻击者可以上传恶意文件,从而进一步控制设备。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/BasuCert/WinboxPoC | POC详情 |
2 | C# implementation of BasuCert/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)] | https://github.com/msterusky/WinboxExploit | POC详情 |
3 | Automated version of CVE-2018-14847 (MikroTik Exploit) | https://github.com/syrex1013/MikroRoot | POC详情 |
4 | MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞 | https://github.com/jas502n/CVE-2018-14847 | POC详情 |
5 | Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 | https://github.com/mahmoodsabir/mikrotik-beast | POC详情 |
6 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/Tr33-He11/winboxPOC | POC详情 |
7 | PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script | https://github.com/sinichi449/Python-MikrotikLoginExploit | POC详情 |
8 | None | https://github.com/yukar1z0e/CVE-2018-14847 | POC详情 |
9 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/hacker30468/Mikrotik-router-hack | POC详情 |
10 | By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions: | https://github.com/babyshen/routeros-CVE-2018-14847-bytheway | POC详情 |
11 | None | https://github.com/K3ysTr0K3R/CVE-2018-14847-EXPLOIT | POC详情 |
12 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/tausifzaman/CVE-2018-14847 | POC详情 |
标题: MikroTik Routers and Wireless - Security -- 🔗来源链接
标签:
暂无评论