尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection | https://github.com/imnotcha0s/CVE-2024-10914 | POC详情 |
| 2 | POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS | https://github.com/verylazytech/CVE-2024-10914 | POC详情 |
| 3 | 这是一个D-Link rce漏洞 检测程序 | https://github.com/Bu0uCat/D-Link-NAS-CVE-2024-10914- | POC详情 |
| 4 | CVE-2024-10914_Manual testing with burpsuite | https://github.com/Egi08/CVE-2024-10914 | POC详情 |
| 5 | CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices. | https://github.com/ThemeHackers/CVE-2024-10914 | POC详情 |
| 6 | dlink vulnerability thing in python and rust | https://github.com/retuci0/cve-2024-10914-port | POC详情 |
| 7 | A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) | https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT | POC详情 |
| 8 | CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely. | https://github.com/jahithoque/CVE-2024-10914-Exploit | POC详情 |
| 9 | CVE-2024-10914 D-Link Remote Code Execution (RCE) | https://github.com/redspy-sec/D-Link | POC详情 |
| 10 | A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) | https://github.com/dragonXZH/CVE-2024-10914 | POC详情 |
| 11 | None | https://github.com/yenyangmjaze/cve-2024-10914 | POC详情 |
| 12 | CVE-2024-10914 Shell Exploit | https://github.com/silverxpymaster/CVE-2024-10914-Exploit | POC详情 |
| 13 | A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-10914.yaml | POC详情 |
| 14 | CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices. | https://github.com/TH-SecForge/CVE-2024-10914 | POC详情 |
| 15 | CVE-2024-10914 Shell Exploit | https://github.com/Tamirido30/CVE-2024-10914-Exploit | POC详情 |
| 16 | PoC para explotar el CVE-2024-10914 | https://github.com/0xSS3K/CVE-2024-10914__POC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论