Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-11519 PoC — TP-Link Archer C9(UN) 安全漏洞

Source
Associated Vulnerability
Title:TP-Link Archer C9(UN) 安全漏洞 (CVE-2017-11519)
Description:TP-Link Archer C9(UN)是中国普联(TP-LINK)公司的一款无线路由器产品。 TP-Link Archer C9(UN) V2_160517版本中的passwd_recovery.lua文件存在安全漏洞。攻击者可利用该漏洞重置管理员密码。
Description
POC for TP-Link Archer C9 - Admin Password Reset and RCE (CVE-2017-11519)
Readme
# tplink-CVE-2017-11519
POC for TP-Link Archer C9 - Admin Password Reset and RCE (CVE-2017-11519)

See the writeup at https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html
File Snapshot

[4.0K] /data/pocs/95889b700b181ae1a7c58fc7f7d1d2251a783192 ├── [ 199] README.md ├── [3.6K] tplink.py └── [1.1K] utils.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.