From 38e4c232eeaf1a9118459b10b165fc9ba253b3ec Mon Sep 17 00:00:00 2001 From: mr-xn Date: Wed, 12 Feb 2020 13:44:58 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E4=BB=8E=20Interfaces.d=20=E5=88=B0=20RC?= =?UTF-8?q?E=EF=BC=9AMozilla=20WebThings=20IoT=20=E7=BD=91=E5=85=B3?= =?UTF-8?q?=E6=BC=8F=E6=B4=9E=E6=8C=96=E6=8E=98?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 7e97f22..32be6d5 100644 --- a/README.md +++ b/README.md @@ -23,6 +23,7 @@ - [小米系列路由器远程命令执行漏洞(CVE-2019-18370,CVE-2019-18371)](https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC) - [Huawei HG255 Directory Traversal[目录穿越]](https://packetstormsecurity.com/files/155954/huaweihg255-traversal.rb.txt)|[本地备份文件](./tools/huaweihg255-traversal.rb) - [D-Link Devices - Unauthenticated Remote Command Execution in ssdpcgi (Metasploit)CVE-2019-20215(Metasploit)](./POC_Details/D-Link%20Devices%20-%20Unauthenticated%20Remote%20Command%20Execution%20in%20ssdpcgi%20(Metasploit)%20CVE-2019-20215.rb) +- [从 Interfaces.d 到 RCE:Mozilla WebThings IoT 网关漏洞挖掘](https://research.nccgroup.com/2020/02/10/interfaces-d-to-rce/) ## Web APP