关联漏洞
描述
PoC and exploit scripts for CVE-2023-20048 - Remote Code Execution vulnerability affecting Cisco RV series routers. Includes a vulnerability checker (PoC) and a working exploit for gaining remote shell access. For educational and research purposes only.
介绍
# CVE-2023-20048 — Cisco RV Series PoC & Exploit
**⚠ WARNING:** For **authorized testing only**. Do not use against systems you do not own or have written permission to test. This is a **Proof of Concept** for **authorized testing only**.
## What this is
Small repository with:
- `CiscoPoc.py` — harmless PoC to check for CVE-2023-20048.
- `CiscoRCE.py` — exploit that attempts a reverse shell via the vulnerable `form2ping.cgi`.
-
## **Description**
This script checks if a **Cisco RV Series router** is vulnerable to **CVE-2023-20048**, a command injection flaw leading to **RCE as root**.
## Requirements
- Python 3.8+
- `requests` (`pip install requests`)
## References
- CVE record: [CVE-2023-20048 — NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-20048).
- Cisco advisory: [Cisco Security Advisory — CVE-2023-20048](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN).
> ⚠ Note: According to the official NVD and Cisco advisory, CVE-2023-20048 is associated with Cisco Firepower Management Center (FMC). Make sure this CVE actually applies to the Cisco RV Series devices you are testing — if not, correct the CVE/advisory links to the appropriate CVE.
### Check (PoC)
```bash
python3 CiscoPoc.py -t <TARGET_IP> -u <USER> -p <PASS>
文件快照
[4.0K] /data/pocs/655377f3d77e05d1a6997dd02678e11b79e1f086
├── [1.8K] CiscoPoC.py
├── [2.0K] CiscoRCE.py
├── [ 309] LegalNotice
├── [1.0K] LICENSE
└── [1.3K] README.md
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。