Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/BasuCert/WinboxPoC | POC Details |
| 2 | C# implementation of BasuCert/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)] | https://github.com/msterusky/WinboxExploit | POC Details |
| 3 | Automated version of CVE-2018-14847 (MikroTik Exploit) | https://github.com/syrex1013/MikroRoot | POC Details |
| 4 | MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞 | https://github.com/jas502n/CVE-2018-14847 | POC Details |
| 5 | Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 | https://github.com/mahmoodsabir/mikrotik-beast | POC Details |
| 6 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/Tr33-He11/winboxPOC | POC Details |
| 7 | PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script | https://github.com/sinichi449/Python-MikrotikLoginExploit | POC Details |
| 8 | None | https://github.com/yukar1z0e/CVE-2018-14847 | POC Details |
| 9 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/hacker30468/Mikrotik-router-hack | POC Details |
| 10 | By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions: | https://github.com/babyshen/routeros-CVE-2018-14847-bytheway | POC Details |
| 11 | None | https://github.com/K3ysTr0K3R/CVE-2018-14847-EXPLOIT | POC Details |
| 12 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/tausifzaman/CVE-2018-14847 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet