mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
29 lines
1.5 KiB
Markdown
29 lines
1.5 KiB
Markdown
![]() |
### [CVE-2017-5135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5135)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication_bypass/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/nixawk/labs
|
||
|
- https://github.com/oneplus-x/MS17-010
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/readloud/Awesome-Stars
|
||
|
- https://github.com/stringbleed/stringbleed.github.io
|
||
|
- https://github.com/stringbleed/tools
|
||
|
- https://github.com/taielab/awesome-hacking-lists
|
||
|
- https://github.com/xbl2022/awesome-hacking-lists
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
|