Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software | 16.1.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/raystr-atearedteam/CVE-2023-20198-checker | POC Details |
| 2 | CVE-2023-20198 Checkscript | https://github.com/Atea-Redteam/CVE-2023-20198 | POC Details |
| 3 | cisco-CVE-2023-20198-tester | https://github.com/securityphoenix/cisco-CVE-2023-20198-tester | POC Details |
| 4 | None | https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198 | POC Details |
| 5 | CVE-2023-20198 & 0Day Implant Scanner | https://github.com/ZephrFish/CVE-2023-20198-Checker | POC Details |
| 6 | Checker for CVE-2023-20198 , Not a full POC Just checks the implementation and detects if hex is in response or not | https://github.com/JoyGhoshs/CVE-2023-20198 | POC Details |
| 7 | CVE-2023-20198 PoC (!) | https://github.com/Tounsi007/CVE-2023-20198 | POC Details |
| 8 | This script can identify if Cisco IOS XE devices are vulnerable to CVE-2023-20198 | https://github.com/alekos3/CVE_2023_20198_Detector | POC Details |
| 9 | Ansible Playbook for CVE-2023-20198 | https://github.com/ditekshen/ansible-cve-2023-20198 | POC Details |
| 10 | None | https://github.com/reket99/Cisco_CVE-2023-20198 | POC Details |
| 11 | 1vere$k POC on the CVE-2023-20198 | https://github.com/iveresk/cve-2023-20198 | POC Details |
| 12 | CISCO CVE POC SCRIPT | https://github.com/sohaibeb/CVE-2023-20198 | POC Details |
| 13 | Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273) | https://github.com/fox-it/cisco-ios-xe-implant-detection | POC Details |
| 14 | A PoC for CVE 2023-20198 | https://github.com/Pushkarup/CVE-2023-20198 | POC Details |
| 15 | This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273 | https://github.com/Shadow0ps/CVE-2023-20198-Scanner | POC Details |
| 16 | Check a target IP for CVE-2023-20198 | https://github.com/kacem-expereo/CVE-2023-20198 | POC Details |
| 17 | None | https://github.com/mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner | POC Details |
| 18 | None | https://github.com/ohlawd/CVE-2023-20198 | POC Details |
| 19 | None | https://github.com/IceBreakerCode/CVE-2023-20198 | POC Details |
| 20 | An Exploitation script developed to exploit the CVE-2023-20198 Cisco zero day vulnerability on their IOS routers | https://github.com/sanjai-AK47/CVE-2023-20198 | POC Details |
| 21 | CVE-2023-20198 Exploit PoC | https://github.com/smokeintheshell/CVE-2023-20198 | POC Details |
| 22 | Check for and remediate conditions that make an IOS-XE device vulnerable to CVE-2023-20198 | https://github.com/netbell/CVE-2023-20198-Fix | POC Details |
| 23 | Cisco CVE-2023-20198 | https://github.com/Vulnmachines/Cisco_CVE-2023-20198 | POC Details |
| 24 | An Exploitation script developed to exploit the CVE-2023-20198 Cisco zero day vulnerability on their IOS routers | https://github.com/RevoltSecurities/CVE-2023-20198 | POC Details |
| 25 | CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands. | https://github.com/W01fh4cker/CVE-2023-20198-RCE | POC Details |
| 26 | None | https://github.com/sanan2004/CVE-2023-20198 | POC Details |
| 27 | 🚨 Just completed a detailed investigation for Event ID 193: "SOC231 - Cisco IOS XE Web UI ZeroDay (CVE-2023-20198)" via @LetsDefend.io. The attacker successfully bypassed authentication, gaining admin control over the device! Immediate containment was critical. Stay vigilant! 💻🔐 | https://github.com/AhmedMansour93/Event-ID-193-Rule-Name-SOC231-Cisco-IOS-XE-Web-UI-ZeroDay-CVE-2023-20198- | POC Details |
| 28 | CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞,允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户,从而完全控制设备。 | https://github.com/XiaomingX/CVE-2023-20198-poc | POC Details |
| 29 | CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞,允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户,从而完全控制设备。 | https://github.com/XiaomingX/cve-2023-20198-poc | POC Details |
| 30 | A go-exploit to scan for implanted Cisco IOS XE Systems cve-2023-20198, go-exploit | https://github.com/unsightlyabol/cisco-ios-xe-implant-scanner | POC Details |
| 31 | Exploit PoC for CVE-2023-20198 | https://github.com/G4sul1n/Cisco-IOS-XE-CVE-2023-20198 | POC Details |
| 32 | Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system. For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory. Cisco will provide updates on the status of this investigation and when a software patch is available. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-20198.yaml | POC Details |
| 33 | None | https://github.com/Arshit01/CVE-2023-20198 | POC Details |
| 34 | A cybersecurity case study analysing CVE-2023-20198 in Cisco IOS XE, covering vulnerability exploitation, mitigation strategies, secure software development frameworks, and patch management policies, with practical insights from a controlled lab environment | https://github.com/Religan/CVE-2023-20198 | POC Details |
| 35 | CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞,允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户,从而完全控制设备。 | https://github.com/djayaGit/cve-2023-20198-poc-cisco | POC Details |
No public POC found.
Login to generate AI POCNo comments yet