关联漏洞
描述
POC of CVE-2018-9995 written in Rust.
介绍
## Overview
This repository contains a proof-of-concept (PoC) exploit implemented in Rust targeting CVE-2018-9995. The code is for research, education, and defensive testing in controlled environments only.
## CVE Details
- Identifier: `CVE-2018-9995`
- Summary: Proof-of-concept exploit demonstrating the vulnerability (see public advisories for technical details).
## Requirements
- Rust toolchain (stable) — `rustc` and `cargo`.
- Linux or any platform supported by Rust.
## Usage
The repository is a PoC. Typical usage (example):
```bash
cargo run -- IP PORT
```
Eg:
```bash
cargo run -- 0.0.0.0 85
```
Defaults to port `80` if port isn't specified.
<img width="1367" height="769" alt="how-it-works" src="https://github.com/user-attachments/assets/1d293806-b937-493f-961b-f21af02f38ff" />
---
## Fining Vulnerable Devices
### Google Dork
```
intitle:"DVR Login"
```
<img width="1036" height="573" alt="googlePOC" src="https://github.com/user-attachments/assets/939995ea-0858-4d27-862b-464232dc193a" />
---
## Credits
- Author: 0xDamian, [@damnsec1](https://x.com/damnsec1) on Twitter
- References: https://nvd.nist.gov/vuln/detail/cve-2018-9995 (CVE Database), https://github.com/ezelf/CVE-2018-9995_dvr_credentials (Python POC)
文件快照
[4.0K] /data/pocs/4980ca9afeaeb9186b75657b860dc2f97320669a
├── [5.3K] Cargo.lock
├── [ 243] Cargo.toml
├── [1.2K] README.md
└── [4.0K] src
├── [4.4K] lib.rs
└── [ 642] main.rs
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。