Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-26878 PoC — Ruckus Networks Ruckus IoT 注入漏洞

Source
Associated Vulnerability
Title:Ruckus Networks Ruckus IoT 注入漏洞 (CVE-2020-26878)
Description:Ruckus Networks Ruckus IoT是美国Ruckus Networks公司的一个应用于连接 Ruckus IoT-Ready AP 的设备。该设备可作为物联网设备端点连接控制器。 Ruckus Networks Ruckus 1.5.1.0.21 之前版本存在注入漏洞,该漏洞使经过身份验证的用户可以向API (/service/v1/createUser endpoint)提交查询,注入任意命令以root用户身份进行执行。
Readme
# CVE-2020-26878

This is a modified version of the Ruckus exploit found at https://www.exploit-db.com/exploits/49110

Since the original exploit was written for Python 2, I tweaked it a little to make it work with Python 3.

Note: I am not responsible for any illegal use of this exploit. This is only for educational and testing purposes, with the goal of securing systems.
File Snapshot

[4.0K] /data/pocs/fc0235bd83f8676b13768d7f4100ca7df2ad391f ├── [2.8K] PoC.py └── [ 376] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.