### [CVE-2010-2075](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0bfxgh0st/cve-2010-2075 - https://github.com/0x48piraj/PwnHouse - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1 - https://github.com/Glumgam/UnrealiRCd-3.2.8.1-exploit-python - https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution - https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075 - https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT - https://github.com/Sh4dowX404/UnrealIRCD-3.2.8.1-Backdoor - https://github.com/VoitenkoAN/13.1 - https://github.com/XorgX304/UnrealIRCd-3.2.8.1-RCE - https://github.com/baoloc10/SoftwareSec-Metasploitable2 - https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution - https://github.com/chancej715/chancej715 - https://github.com/jebidiah-anthony/htb_irked - https://github.com/kevinpdicks/UnrealIRCD-3.2.8.1-RCE - https://github.com/macosta-42/Exploit-Development - https://github.com/marcocastro100/Intrusion_Detection_System-Python - https://github.com/vmmaltsev/13.1