Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-40930 PoC — Skyworth OS 路径遍历漏洞

Source
Associated Vulnerability
Title:Skyworth OS 路径遍历漏洞 (CVE-2023-40930)
Description:Skyworth OS是中国创维(Skyworth)公司的一个操作系统。 Skyworth OS 3.0版本存在安全漏洞。攻击者利用该漏洞读取运行应用程序的服务器上的任意文件。
Description
 CVE-2023-40930 Repetition Enviroment
Readme
# Introduction
 It's an introduction on how to set up CVE-2023-40930 Repetition Enviroment
 
 Learn more about this CVE problem in "issue detail.pdf"
# Set up
## general
You can use rasperry pi zero 2W or any other ARM64(ARM32 also) arch devices to set up this enviroment,this can be also set up on Android rooted devices
## How to set up
### for no-android devices
Make a directory path which is "/system/lib",and copy the "lib" DIR in this program to /system/lib.
And then make a directory path which is "/system/bin",and copy the "blkid" and "linker" to this path.
After that,you can insert your Bad Udisk and exec "/system/bin/blkid" to repeat this problem
### for android devices
Just add all the files in the "lib" DIR to /system/lib , then move the "blkid" to an X-Permission path, after that you can also repeat this problem by
insert your Bad Udisk and exec "/system/bin/blkid".
# More contact
For more contact ,send email to namelessyyds@gmail.com
File Snapshot

[4.0K] /data/pocs/8ff3575844dbe97fbbc3eb0b018d74f6d48e9866 ├── [ 33K] 1.txt ├── [9.7K] blkid ├── [648K] issue detail.pdf ├── [1.7M] lib.zip ├── [1.0M] linker └── [ 958] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.