Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-2075 PoC — UnrealIRCd 后门未授权访问漏洞

Source
Associated Vulnerability
Title:UnrealIRCd 后门未授权访问漏洞 (CVE-2010-2075)
Description:2009年11月到2010年6月间分布于某些镜面站点的UnrealIRCd,在DEBUG3_DOLOG_SYSTEM宏中包含外部引入的修改(特洛伊木马),远程攻击者可执行任意命令。
Description
Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075
Readme
# UnrealIRCd-3.2.8.1-Backdoor-Command-Execution
Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075
# Usage
usage: IRC_BackDoorCommandExecution.py [-h] target_host target_port attacker_host attacker_port
File Snapshot

[4.0K] /data/pocs/3d301a8a8a2f3302fd73a06c976a6a7ebfc26d00 ├── [2.4K] IRC_BackDoorCommandExecution.py ├── [ 34K] LICENSE └── [ 272] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.