Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38063 PoC — Microsoft Windows TCP/IP component 数字错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows TCP/IP component 数字错误漏洞 (CVE-2024-38063)
Description:Microsoft Windows tcp/ip是美国微软(Microsoft)公司的一个 Windows 的 Tcp/Ip 支持服务。 Microsoft Windows TCP/IP component存在数字错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 f
Description
Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.
Readme
Real POC published https://github.com/ynwarcs/CVE-2024-38063 and I have updated in my code as well, This can cause crash into your system so use VM or just learning thing, you can get RCE by making changes in the code.

#### Usage

```iface``` <- If you have multiple adapters, you need to choose which one to use to send packets. e.g. "eth0" on linux or "Hyper-V Virtual Ethernet Adapter" on windows. If you're going to use your default interface, leave it empty.

```ip_addr``` <- IP address of the target system (IPv6)

```num_tries & num_batches``` <- How many different packet batches to send. more of them = more heap corruptions caused + higher chance of triggering the vulnerability.

```mac_addr``` <- Leave empty, unless scapy complains it can't find the mac address. See below in troubleshooting.

Enable it => Most probably this is enabled bydefault. 

![Screenshot_1](https://github.com/user-attachments/assets/01d8da94-6dbc-49eb-86b0-6c52d97f5073)

<mark>Check the ```CVE-2024-38063-poc.py``` for more.<mark>

Finder https://x.com/XiaoWei___
Code/POC credit => @ynwarcs
Thank You!
- Chirag Artani
File Snapshot

[4.0K] /data/pocs/3b31567e931ad86fc25695fca4637e1f44674c3e ├── [1.4K] CVE-2024-38063-poc.py ├── [1.1K] README.md └── [153K] Screenshot_1.png 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.