Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-30800 PoC — MikroTik RouterOS 缓冲区错误漏洞

Source
Associated Vulnerability
Title:MikroTik RouterOS 缓冲区错误漏洞 (CVE-2023-30800)
Description:MikroTik RouterOS是拉脱维亚MikroTik公司的一套基于Linux开发的路由器操作系统。该系统可部署在PC中,使其提供路由器功能。 MikroTik RouterOS 6.49.1之前版本存在安全漏洞,该漏洞源于存在堆内存损坏问题,未经身份验证的远程攻击者可以通过发送精心设计的HTTP请求来破坏服务器的堆内存。
Description
Multithredded DoS Python Script For CVE-2023-30800
Readme
# cve-2023-30800-multithread-doser
Multithredded DoS Python Script For CVE-2023-30800

⚠️ NOTE: I'm not liable for any damages caused by this tool, it is provided as a testing utility only to be used on authorized networks

Usage:

`dos.py --address {IP-ADDRESS} --threads {THREAD-COUNT}`

Requirements:

* Python 3.6 >
* Requests

Install Requirements:

`pip install requests`


CVE: "https://nvd.nist.gov/vuln/detail/CVE-2023-30800"

POC: "https://gist.github.com/j-baines/fdd1e85482838c6299900c1e859071c2"
File Snapshot

[4.0K] /data/pocs/7f98e810495b4ec873be82f839f108810f530d8a ├── [2.1K] dos.py ├── [ 34K] LICENSE └── [ 513] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.