Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38143 PoC — Microsoft Windows WLAN AutoConfig Service 访问控制错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows WLAN AutoConfig Service 访问控制错误漏洞 (CVE-2024-38143)
Description:Microsoft Windows WLAN AutoConfig Service是美国微软(Microsoft)公司的一个Windows Vista以上版本操作系统的无线网卡配置服务。 Microsoft Windows WLAN AutoConfig Service存在访问控制错误漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 11 Version 24H2 for ARM64-based Systems,Windows 11 Version 24H2 for x64-ba
Readme
![Alt text](Snipaste_2024-08-16_16-16-41.png)

# Instructions: Double-click to run the POC, set the target IPv6 address, choose the payload, and click start.
File Snapshot

[4.0K] /data/pocs/d24026fea0b32dc9dd653ff5114364c372d824db ├── [5.7M] CVE-2024-38143 poc.exe ├── [ 158] README.md └── [4.6K] Snipaste_2024-08-16_16-16-41.png 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.