Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| AVTech | AVM1203 (IP Camera) | 0 ~ FullImg-1023-1007-1011-1009 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/K3ysTr0K3R/CVE-2024-7029-EXPLOIT | POC Details |
| 2 | None | https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT | POC Details |
| 3 | A PoC tool for exploiting CVE-2024-7029 in AvTech devices, enabling RCE, vulnerability scanning, and an interactive shell. | https://github.com/ebrasha/CVE-2024-7029 | POC Details |
| 4 | A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE) | https://github.com/geniuszlyy/CVE-2024-7029 | POC Details |
| 5 | A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE) | https://github.com/geniuszly/CVE-2024-7029 | POC Details |
| 6 | The endpoint `/cgi-bin/supervisor/Factory.cgi` is vulnerable to command injection via the `action` parameter, allowing remote code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-7029.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet