尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/BasuCert/WinboxPoC | POC详情 |
| 2 | C# implementation of BasuCert/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)] | https://github.com/msterusky/WinboxExploit | POC详情 |
| 3 | Automated version of CVE-2018-14847 (MikroTik Exploit) | https://github.com/syrex1013/MikroRoot | POC详情 |
| 4 | MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞 | https://github.com/jas502n/CVE-2018-14847 | POC详情 |
| 5 | Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 | https://github.com/mahmoodsabir/mikrotik-beast | POC详情 |
| 6 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/Tr33-He11/winboxPOC | POC详情 |
| 7 | PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script | https://github.com/sinichi449/Python-MikrotikLoginExploit | POC详情 |
| 8 | None | https://github.com/yukar1z0e/CVE-2018-14847 | POC详情 |
| 9 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/hacker30468/Mikrotik-router-hack | POC详情 |
| 10 | By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions: | https://github.com/babyshen/routeros-CVE-2018-14847-bytheway | POC详情 |
| 11 | None | https://github.com/K3ysTr0K3R/CVE-2018-14847-EXPLOIT | POC详情 |
| 12 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/tausifzaman/CVE-2018-14847 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论