Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-33669 PoC — Tenda AC8 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Tenda AC8 缓冲区错误漏洞 (CVE-2023-33669)
Description:Tenda AC8是中国腾达(Tenda)公司的一款无线路由器。 Tenda AC8V4.0-V16.03.34.06版本存在安全漏洞,该漏洞源于参数timeZone存在堆栈溢出问题。
Description
Exploits for Tenda Ac8v4 stack-based overflow to Remote-Code Execution via Mipsel Ropping (CVE-2023-33669 - CVE-2023-33675)
Readme
# Tenda-Ac8v4-PoC

Tenda Ac8v4 Stack-Based Overflow to Remote-Code Execution via execution-flow hijacking & multiple-register manipulation exploitation; CVEs are:

* `CVE-2023-33675`
* `CVE-2023-33673`
* `CVE-2023-33672`
* `CVE-2023-33671`
* `CVE-2023-33670`
* `CVE-2023-33669`

Marked as `N1` - `N7`

## `rop.py`
* make sure you hosted `tftp` on accessible machine; specific it by `args.attacker_host`;
* make sure pre-compiled loader `rs` is hosted in `tftp`;
* reverse-shell connection will be listen in-script.
File Snapshot

[4.0K] /data/pocs/7adec821d70b920e2d02abcc14e528429bc850dc ├── [4.0K] cve-reports │   ├── [4.0K] N1 │   │   ├── [356K] qemu_httpd_20230516-211911_1801.core │   │   └── [1.4K] README.md │   ├── [4.0K] N2 │   │   ├── [356K] qemu_httpd_20230516-212051_1817.core │   │   └── [1.1K] README.md │   ├── [4.0K] N3 │   │   ├── [360K] qemu_httpd_20230516-212506_1852.core │   │   └── [1.3K] README.md │   ├── [4.0K] N4 │   │   ├── [356K] qemu_httpd_20230516-212838_1949.core │   │   └── [1.3K] README.md │   ├── [4.0K] N5 │   │   ├── [356K] qemu_httpd_20230516-213000_1966.core │   │   └── [1.7K] README.md │   ├── [4.0K] N6 │   │   ├── [356K] qemu_httpd_20230516-213115_1983.core │   │   └── [1.3K] README.md │   └── [4.0K] N7 │   ├── [356K] qemu_httpd_20230516-213242_2000.core │   └── [1.4K] README.md ├── [4.0K] exploit │   ├── [7.4K] rop.py │   ├── [658K] rs │   └── [ 600] rs.c └── [ 515] README.md 9 directories, 18 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.