Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18371 PoC — Xiaomi Mi WiFi R3G 路径遍历漏洞

Source
Associated Vulnerability
Title:Xiaomi Mi WiFi R3G 路径遍历漏洞 (CVE-2019-18371)
Description:Xiaomi Mi WiFi R3G是中国小米科技(Xiaomi)公司的一款3G路由器。 Xiaomi Mi WiFi R3G 2.28.23-stable之前版本中存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Description
A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.
File Snapshot

[4.0K] /data/pocs/41a4c76320e99643ab2fa173672b66ad8660c1e6 ├── [1.9K] arbitrary_file_read_vulnerability.py ├── [1.8K] remote_command_execution_vulnerability.py ├── [4.0K] report │   ├── [ 88K] 1.png │   ├── [ 34K] 2.png │   ├── [106K] 3.png │   └── [ 16K] report.md ├── [ 9] requirements.txt └── [1.8K] template.xml 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.