POC详情: a21765d3effbcb1cc0c2475a73744b781ae3c5f6

来源
关联漏洞

疑似Oday

描述
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
介绍
<p align="center">
  <a href="http://www.theunwindai.com">
    <img src="https://github.com/user-attachments/assets/fe95e86b-926a-45e1-bb58-741b34bf76a0" width="900" height="400" alt="Unwind AI">
  </a>
</p>

<div align="center">

<a href="z"><img src="https://img.shields.io/badge/VB.NET-512BD4?style=for-the-badge&logo=dotnet&logoColor=white"/></a>
<a href="z"><img src="https://img.shields.io/badge/Visual_Studio-5C2D91?style=for-the-badge&logo=visual%20studio&logoColor=white"/></a>
<a href="z"><img src="https://img.shields.io/badge/VSCode-0078D4?style=for-the-badge&logo=visual%20studio%20code&logoColor=white"/></a>
</div>


# AnyDesk Exploit

AnyDesk, remote access software, has faced security concerns like RCE (Remote Code Execution), allowing attackers to execute malicious code on target systems. CVE-2020-13160 highlights a DLL hijacking flaw in versions prior to 5.5.2, enabling unauthorized system access. Authentication bypass risks let attackers skip login requirements, while DLL injection allows malicious libraries to run. Insecure permission management may grant excessive user privileges. Clipboard data leakage exposes sensitive copied content, and network scanning vulnerabilities reveal system info.

## Features

* 1. RCE (Remote Code Execution)
* 2. CVE-2020-13160
* 3. Authentication Bypass
* 4. DLL Injection
* 5. Insecure Permission Management
* 6. CVE-2019-14743
* 7. Unauthorized Audio Chat Access
* 8. Clipboard Data Leakage
* 9. Network Scanning Vulnerability
* 10. Version Check Bypass

### Requirements  
- Visual Studio 2022
- .NET Framework must be installed.  
![133](https://github.com/fikfifkasd/asd2342/assets/80986477/df0c0345-8a39-4bab-83ce-9211c8324283)

### Compilation
- Download the project to your computer
- Extract the project to a Folder.
- Open Solution File
- Select **Build Solution** from the **Build** menu.
  - ![vsgif](https://github.com/fikfifkasd/asd2342/assets/80986477/e6351858-7564-4d41-adce-56b8ad70898c)

- Find Executable File
```
./bin/Debug/
```

## Preview
![photo_2025-04-02_20-19-43](https://github.com/user-attachments/assets/fc7ae72d-9e99-4155-b170-9e2a30ec1ba4)


https://github.com/user-attachments/assets/a50bb11e-bd9c-44c3-a459-4ddd0a6a9932

## Contributing

**⭐ Star this repository if you find it useful!**

## Disclaimer

**This content is provided for learning and testing purposes only. The information presented is for general information purposes and does not address any specific situation.**


## Licence

Project is licenced under the [MIT licence](https://github.com/AvaloniaUI/Avalonia/blob/master/licence.md).

文件快照

[4.0K] /data/pocs/a21765d3effbcb1cc0c2475a73744b781ae3c5f6 ├── [ 25] AnyDesk ├── [4.0K] AnyDesk Exploit │   ├── [ 46K] AnyDesk Exploit.vbproj │   ├── [ 479] AnyDesk Exploit.vbproj.user │   ├── [5.1K] App.config │   ├── [3.7K] Form1.Designer.vb │   ├── [5.7K] Form1.resx │   ├── [4.1K] Form1.vb │   └── [4.0K] My Project │   ├── [1.5K] Application.Designer.vb │   ├── [ 510] Application.myapp │   ├── [1.1K] AssemblyInfo.vb │   ├── [2.7K] Resources.Designer.vb │   ├── [5.5K] Resources.resx │   ├── [ 18K] Settings.Designer.vb │   └── [4.6K] Settings.settings ├── [1.1K] AnyDesk Exploit.sln ├── [1.2K] LICENSE ├── [2.5K] README.md └── [ 739] SECURITY.md 2 directories, 18 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。