Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8958 PoC — Guangzhou 1GE ONU V2801RW和V2804RGW 安全漏洞

Source
Associated Vulnerability
Title:Guangzhou 1GE ONU V2801RW和V2804RGW 安全漏洞 (CVE-2020-8958)
Description:Guangzhou V-Solution Telecommunication Technology Guangzhou 1GE ONU是中国广州维讯通信科技有限公司(Guangzhou V-Solution Telecommunication Technology)公司的一款路由器。 Guangzhou 1GE ONU V2801RW 1.9.1-181203版本至2.9.0-181024版本和V2804RGW 1.9.1-181203版本至2.9.0-181024版本中的boaform/admin/fo
Description
Proof of concept for arbitrary OS command execution on Guangzhou/V-SOL 1GE ONU devices (CVE-2020-8958)
Readme
A proof of concept for CVE-2020-8958 written in Python. The script will return the contents of `/etc/passwd` if successful.

## CVE-2020-8958
Guangzhou 1GE ONU V2801RW 1.9.1-181203 through 2.9.0-181024 and V2804RGW 1.9.1-181203 through 2.9.0-181024 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the boaform/admin/formPing Dest IP Address field. 

## Requirements
- Python 3.X
- bs4 

## Usage
```python poc.py <IP_ADDR>```
File Snapshot

[4.0K] /data/pocs/c75aca473e4984d3b4ce0625c5f4fb305649b16b ├── [1.9K] poc.py └── [ 469] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.