### [CVE-2016-4971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource. ### POC #### Reference - http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - https://www.exploit-db.com/exploits/40064/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Craxti/packet_analysis - https://github.com/Filirom1/vulnerability-api - https://github.com/KosukeShimofuji/cve_watch - https://github.com/dinidhu96/IT19013756_-CVE-2016-4971- - https://github.com/gitcollect/CVE-2016-4971 - https://github.com/lnick2023/nicenice - https://github.com/mbadanoiu/CVE-2016-4971 - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/tanjiti/packet_analysis - https://github.com/xbl3/awesome-cve-poc_qazbnm456