Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5995 PoC — Mediabridge Medialink MWN-WAPR300N和Tenda N3 Wireless N150 权限许可和访问控制漏洞

Source
Associated Vulnerability
Title:Mediabridge Medialink MWN-WAPR300N和Tenda N3 Wireless N150 权限许可和访问控制漏洞 (CVE-2015-5995)
Description:Mediabridge Medialink MWN-WAPR300N和Tenda N3 Wireless N150都是无线路由器产品。Mediabridge Medialink MWN-WAPR300N是美国Mediabridge公司的产品。Tenda N3 Wireless N150是中国腾达(Tenda)公司的产品。 使用5.07.50版本固件的Mediabridge Medialink MWN-WAPR300N设备和Tenda N3 Wireless N150设备中存在安全漏洞。远程攻击者可借助HT
Description
An exploitation tool to extract passwords using CVE-2015-5995.
Readme
# TendaSpill

An exploitation tool to extract passwords using CVE-2015-5995.


### CVE-2015-5995

Mediabridge Medialink MWN-WAPR300N devices with firmware 5.07.50 and Tenda N3 Wireless N150 devices allow remote attackers to obtain administrative access via a certain admin substring in an HTTP Cookie header.


## Disclaimer

This tool is for testing and educational purposes only. Any other usage for this code is not allowed. Use at your own risk. The author or any Internet provider bears NO responsibility for misuse of this tool. By using this you accept the fact that any damage caused by the use of this tool is your responsibility.

"In the end, we're all alone. And no one's coming to save you." 
-John Reese, Person of Interest.


## Interesting Read

https://hk.saowen.com/a/31cc238470dacd72b1775a20c84fbd73f6d818ff6063bb23e7bfad387a43ccec


## Demo

https://www.facebook.com/shahee.mirza.5/videos/1154224851419835/


## How to use

```
$ bash tendaspill.sh IP:PORT
$ bash tendaspill.sh 192.168.1.1:8080
```

## Contributing

Go ahead! you know what to do.



## License

The source code is licensed under the MIT license.
File Snapshot

[4.0K] /data/pocs/1656308da27c72afcf08b08c839988663d1be69a ├── [1.0K] LICENSE ├── [1.1K] README.md └── [1.8K] tendaspill.sh 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.