Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-35713 PoC — Belkin LINKSYS RE6500 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Belkin LINKSYS RE6500 操作系统命令注入漏洞 (CVE-2020-35713)
Description:Belkin LINKSYS RE6500是美国Belkin公司的一款无线路由器。 Belkin LINKSYS RE6500 devices 1.0.012.001之前版本存在操作系统命令注入漏洞,该漏洞允许远程攻击者可利用该漏洞通过shell元字符在goform setSysAdm页面上执行任意命令或设置新密码。
Description
CVE-2020-35713
Readme
## Description

Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.

## How to use

Step 1: Modify the IP address in cve-2020-35713.py file to the target address

Step 2: Run the cve-2020-35713.py to  change the password   

Step 3: login test

File Snapshot

[4.0K] /data/pocs/f121e4a2ba2111caaa4c2aeb414bbec6102d7c3c ├── [2.1K] CVE-2020-35713.py └── [ 384] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.