Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| QNAP Systems Inc. | QTS | 5.1.x ~ 5.1.7.2770 build 20240520 | - | |
| QNAP Systems Inc. | QuTS hero | h5.1.x ~ h5.1.7.2770 build 20240520 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC for CVE-2024-27130 | https://github.com/watchtowrlabs/CVE-2024-27130 | POC Details |
| 2 | This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS | https://github.com/d0rb/CVE-2024-27130 | POC Details |
| 3 | CVE-2024-27130是影响QNAP网络附加存储(NAS)设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数,导致堆栈缓冲区溢出。攻击者可以利用此漏洞,通过精心构造的请求在目标系统上执行任意代码,进而完全控制受影响的设备。 | https://github.com/XiaomingX/cve-2024-27130-poc | POC Details |
| 4 | CVE-2024-27130是影响QNAP网络附加存储(NAS)设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数,导致堆栈缓冲区溢出。攻击者可以利用此漏洞,通过精心构造的请求在目标系统上执行任意代码,进而完全控制受影响的设备。 | https://github.com/dkstar11q/cve-2024-27130-poc | POC Details |
No public POC found.
Login to generate AI POCNo comments yet