Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection | https://github.com/imnotcha0s/CVE-2024-10914 | POC Details |
| 2 | POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS | https://github.com/verylazytech/CVE-2024-10914 | POC Details |
| 3 | 这是一个D-Link rce漏洞 检测程序 | https://github.com/Bu0uCat/D-Link-NAS-CVE-2024-10914- | POC Details |
| 4 | CVE-2024-10914_Manual testing with burpsuite | https://github.com/Egi08/CVE-2024-10914 | POC Details |
| 5 | CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices. | https://github.com/ThemeHackers/CVE-2024-10914 | POC Details |
| 6 | dlink vulnerability thing in python and rust | https://github.com/retuci0/cve-2024-10914-port | POC Details |
| 7 | A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) | https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT | POC Details |
| 8 | CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely. | https://github.com/jahithoque/CVE-2024-10914-Exploit | POC Details |
| 9 | CVE-2024-10914 D-Link Remote Code Execution (RCE) | https://github.com/redspy-sec/D-Link | POC Details |
| 10 | A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) | https://github.com/dragonXZH/CVE-2024-10914 | POC Details |
| 11 | None | https://github.com/yenyangmjaze/cve-2024-10914 | POC Details |
| 12 | CVE-2024-10914 Shell Exploit | https://github.com/silverxpymaster/CVE-2024-10914-Exploit | POC Details |
| 13 | A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-10914.yaml | POC Details |
| 14 | CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices. | https://github.com/TH-SecForge/CVE-2024-10914 | POC Details |
| 15 | CVE-2024-10914 Shell Exploit | https://github.com/Tamirido30/CVE-2024-10914-Exploit | POC Details |
| 16 | PoC para explotar el CVE-2024-10914 | https://github.com/0xSS3K/CVE-2024-10914__POC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet