Python script to exploit CVE-2021-35064 and CVE-2021-36356## CVE-2021-36356 and CVE-2021-35064 PoC
Usage:
```bash
______ _______ ____ ___ ____ _ _________ ___ __ _ _
/ ___\ \ / / ____| |___ \ / _ \___ \/ | |___ / ___| / _ \ / /_ | || |
| | \ \ / /| _| _____ __) | | | |__) | |_____ |_ \___ \| | | | '_ \| || |_
| |___ \ V / | |__|_____/ __/| |_| / __/| |_____|__) |__) | |_| | (_) |__ _|
\____| \_/ |_____| |_____|\___/_____|_| |____/____/ \___/ \___/ |_|
Coded By Valentin Lobstein
usage: CVE-2021-35064.py [-h] [-i I] [-f F]
Example : python3 CVE-2021-35064.py -i 127.0.0.1
options:
-h, --help show this help message and exit
-i I IP address (not url)
-f F IP file
```
### Zoomeye CLI Dork:
```bash
zoomeye search '"Welcome to VIA Collaboration Hub"' -num 780 -filter=ip,port
```
### Shodan CLI Dork:
```bash
shodan search 'http.html:"Welcome to VIA Collaboration Hub"' --fields=ip_str,port --separator ":" --limit 1000 | grep ''
```
[4.0K] /data/pocs/44284705b42148e7d7c50c3613f696728082c48c
├── [4.0K] CVE-2021-35064.py
├── [1.1K] README.md
├── [ 122] shodan-dork.txt
└── [ 79] zoomeye-dork.txt
0 directories, 4 files