Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-16720 PoC — Advantech WebAccess 路径遍历漏洞

Source
Associated Vulnerability
Title:Advantech WebAccess 路径遍历漏洞 (CVE-2017-16720)
Description:Advantech WebAccess(前称BroadWin WebAccess)是研华(Advantech)公司的一套基于浏览器架构的HMI/SCADA软件。该软件支持动态图形显示和实时数据控制,并提供远程控制和管理自动化设备的功能。 Advantech WebAccess 8.3之前的版本中存在路径遍历漏洞。攻击者可该漏洞访问目标设备目录结构内的文件。
Description
WebAccess远程命令执行漏洞(CVE-2017-16720)复现
File Snapshot

[4.0K] /data/pocs/7be56513d12f6e79dfa20d50567535d6b6c6ec8f ├── [1.3K] CVE-2017-16720-EXP.py ├── [ 33M] Python27(含环境).zip └── [872K] WebAccess远程命令执行漏洞(CVE-2017-16720)复现.docx 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.