POC详情: 655377f3d77e05d1a6997dd02678e11b79e1f086

来源
关联漏洞
标题: Cisco Firepower Management Center 安全漏洞 (CVE-2023-20048)
描述:Cisco Firepower Management Center(FMC)是美国思科(Cisco)公司的新一代防火墙管理中心软件。 Cisco Firepower Management Center存在安全漏洞,该漏洞源于通过Web服务接口发送的配置命令授权不足,攻击者利用该漏洞可以在受影响的设备上执行某些未经授权的配置命令。
描述
PoC and exploit scripts for CVE-2023-20048 - Remote Code Execution vulnerability affecting Cisco RV series routers.  Includes a vulnerability checker (PoC) and a working exploit for gaining remote shell access. For educational and research purposes only.
介绍
# CVE-2023-20048 — Cisco RV Series PoC & Exploit

**⚠ WARNING:** For **authorized testing only**. Do not use against systems you do not own or have written permission to test. This is a **Proof of Concept** for **authorized testing only**.  

## What this is
Small repository with:
- `CiscoPoc.py` — harmless PoC to check for CVE-2023-20048.
- `CiscoRCE.py` — exploit that attempts a reverse shell via the vulnerable `form2ping.cgi`.
- 
## **Description**  
This script checks if a **Cisco RV Series router** is vulnerable to **CVE-2023-20048**, a command injection flaw leading to **RCE as root**.  

## Requirements
- Python 3.8+
- `requests` (`pip install requests`)

## References

- CVE record: [CVE-2023-20048 — NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-20048).  
- Cisco advisory: [Cisco Security Advisory — CVE-2023-20048](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN).  

> ⚠ Note: According to the official NVD and Cisco advisory, CVE-2023-20048 is associated with Cisco Firepower Management Center (FMC). Make sure this CVE actually applies to the Cisco RV Series devices you are testing — if not, correct the CVE/advisory links to the appropriate CVE.  

### Check (PoC)
```bash
python3 CiscoPoc.py -t <TARGET_IP> -u <USER> -p <PASS>
文件快照

[4.0K] /data/pocs/655377f3d77e05d1a6997dd02678e11b79e1f086 ├── [1.8K] CiscoPoC.py ├── [2.0K] CiscoRCE.py ├── [ 309] LegalNotice ├── [1.0K] LICENSE └── [1.3K] README.md 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。