Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-0228 PoC — linksys wrt54gl 'apply.cgi' 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:linksys wrt54gl 'apply.cgi' 跨站请求伪造漏洞 (CVE-2008-0228)
Description:Linksys WRT54G是Cisco公司的一款无线路由器,结合了无线接入点、交换机和路由器功能的无线路由设备。 Linksys WRT54GL Wireless-G Broadband Router with firmware 4.30.9下的apply.cgi中的跨站请求伪造漏洞允许远程攻击者以管理员的身份进行操作。
Description
Workaround for the vulnerability identified by TWSL2011-007 or CVE-2008-0228 - iOS x509 Certificate Chain Validation Vulnerability
File Snapshot

[4.0K] /data/pocs/332787672e4d65307441bfaebc3554a13be64825 ├── [1.3K] README └── [2.9K] testcert.m 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.