cve/2017/CVE-2017-5135.md

29 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-5135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5135)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability.
### POC
#### Reference
- https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication_bypass/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/lnick2023/nicenice
- https://github.com/nixawk/labs
- https://github.com/oneplus-x/MS17-010
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/readloud/Awesome-Stars
- https://github.com/stringbleed/stringbleed.github.io
- https://github.com/stringbleed/tools
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xbl3/awesome-cve-poc_qazbnm456