Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29269 PoC — Telesquare TLR-2005Ksh 安全漏洞

Source
Associated Vulnerability
Title:Telesquare TLR-2005Ksh 安全漏洞 (CVE-2024-29269)
Description:Telesquare TLR-2005Ksh是韩国Telesquare公司的一款无线路由器。 Telesquare TLR-2005Ksh 1.0.0版本和1.1.4版本存在安全漏洞,该漏洞源于允许攻击者通过Cmd参数运行任意系统命令。
Description
Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit
Readme




Telesquare TLR-2005KSH_RCE (CVE-2024-29269)	Batch scan/exploit 

 <br>

 1.このツールはセキュリティテストのみに使用されており、違法な攻撃については責任を負いません.  <br>
 2.The tool is only used for security testing, and I am not responsible for any illegal attacks.  <br>
 3.工具仅用于安全测试,任何非法攻击本人概不负责. <br> <br>





Help

```
   ___         __    ____   ___ ____  _  _        ____   ___ ____   __   ___
  / __\/\   /\/__\  |___ \ / _ \___ \| || |      |___ \ / _ \___ \ / /_ / _ \
 / /   \ \ / /_\_____ __) | | | |__) | || |_ _____ __) | (_) |__) | '_ \ (_) |
/ /___  \ V //_|_____/ __/| |_| / __/|__   _|_____/ __/ \__, / __/| (_) \__, |
\____/   \_/\__/    |_____|\___/_____|  |_|      |_____|  /_/_____|\___/  /_/


                                                    PowerBy:YongYe_Security


Python3 CVE-2024-29269.py --help

options:
  -h, --help            show this help message and exit
  -u TARGET, --url TARGET
                        Target URL
  -f FILE, --file FILE  Target File
  -c CMD, --cmd CMD     Cmd
  -t THREADS, --threads THREADS
                        Number of threads
```

 <br> <br>

The scan result is saved in result.txt
 <br> <br>
![image](https://github.com/YongYe-Security/CVE-2024-29269/blob/main/24_15-4-33-12-51-856.png)
 <br> <br>
![image](https://github.com/YongYe-Security/CVE-2024-29269/blob/main/24_15-4-34-12-44-011.png)









































File Snapshot

[4.0K] /data/pocs/309898c2b475a21fda25d80b1c364650ac25f20f ├── [954K] 24_15-4-33-12-51-856.png ├── [671K] 24_15-4-34-12-44-011.png ├── [2.7K] CVE-2024-29269.py └── [1.5K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.