Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-34718 PoC — Microsoft Windows TCP/IP component 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows TCP/IP component 安全漏洞 (CVE-2022-34718)
Description:Microsoft Windows TCP/IP component是美国微软(Microsoft)公司的一个为Windows提供TCP/IP配置功能的组件。 Microsoft Windows TCP/IP存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Sys
Readme
# CVE-2022-34718 IPv6 Remote Code Execution exploit sample

This repository contains an exploit of CVE-2022-34718, a Remote Code Execution
(RCE) vulnerability in IPv6 on Windows systems.

## How to

Since the vulnerability requires specially crafted IPv6 packets, it depends on
the Scapy module and therefore needs to run as root. The recommended method to
run this PoC is through a virtual environment, like so:

```
# virtualenv PoC
# source PoC/bin/activate
(PoC) # pip3 install -r requirements.txt
(PoC) # python3 ipv6-rce-poc.py <target address>
```

The script will tell you if the target system is vulnerable to this exploit.

```
[...]
**** inner_frag_id: 0x24944eac
Preparing frags...
Sending 64 frags...
.
Sent 1 packets.
[...]
Sent 1 packets.
Now sending the last inner fragment to trigger the bug...
.
Sent 1 packets.
Success! The system is vulnerable...
File Snapshot

[4.0K] /data/pocs/9f92ef2bce73132c9f9ac49c1629c8c7053137bc ├── [3.8K] ipv6-rce-poc.py ├── [ 34K] LICENSE ├── [ 867] README.md └── [ 6] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.