Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9166 PoC — Atelmo Atemio AM 520 HD Full HD Satellite Receiver 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Atelmo Atemio AM 520 HD Full HD Satellite Receiver 操作系统命令注入漏洞 (CVE-2024-9166)
Description:Atelmo Atemio AM 520 HD Full HD Satellite Receiver是德国Atelmo公司的一个卫星接收器。 Atelmo Atemio AM 520 HD Full HD Satellite Receiver存在操作系统命令注入漏洞,该漏洞源于对使用的特殊元素中和不当。
Description
A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166
Readme
# CVE-2024-9166 Vulnerability Scanner
A Python-based tool to scan websites for the CVE-2024-9166 vulnerability, **which is one of the most recent ones** (at the moment of publishing this repository.). It checks for vulnerable patterns, tests the vulnerability to confirm it, and logs results to a file.

**I'm not responsible in any way of the misuse of this tool. This tool was made with the intention of being used for ethical hacking, doing penetration testing (and every type of hacking) without consent is illegal and can have serious consequences!**

## Installation
To install the tool you can just copy this Github repository with this single command:
```bash
git clone https://github.com/Andrysqui/CVE-2024-9166
```

### Requirements
  * Python 3.7+
  * Install Python dependencies via `pip`:
  ```bash
  pip install requests beautifulsoup4 argparse
  ```

## Usage
### Basic Usage:
  1. **Single URL Scan:**
  ```bash
    python3 CVE-2024-9166.py --url https://example.com
  ```
  2. **Scan Multiple URLs from a File and Logging the Results:**
  ```bash
    python3 CVE-2024-9166.py --file urls.txt --logfile output.log
  ```
  3. **Custom Headers**
  ```bash
    python3 CVE-2024-9166.py --url https://example.com --headers '{"User-Agent": "Custom-Agent", "Bug-Bounty: True", "Pen-Testing: True"}'
  ```

### Command-Line Arguments:
  * `-h` or `--help`: Shows a help message explaining each one of the arguments below.
  * `--url` or `-u`: Specify a single URL to scan (mutually exclusive with `-f` or `--file`).
  * `--file` or `-f`: Path with a file with URLs to scan (one per line, mutually exclusive with `-u` or `--url`).
  * `--logfile` or `-l`: Path to log results (default: `scan_log.txt`).
  * `--headers`: Custom headers in JSON format (e.g., `'{"User-Agent": "Custom-Agent"}'`).
  * `--threads`: Number of threads for scanning multiple URLs (default: 5).
  * `--exploit-command`: Command used to test the vulnerability (default: `id`).
  * `--vulnerable-content`: Pattern to search for inside responses to confirm a vulnerability when using custom command (default: `uid=`).
File Snapshot

[4.0K] /data/pocs/f571c0f81bc609097fe3ba1822320938cabebda4 ├── [7.2K] CVE-2024-9166.py ├── [1.0K] LICENSE ├── [2.0K] README.md └── [ 33] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.