PoC-CVE-2024-10914
by GYATT - Saturday November 16, 2024 at 08:59 PM
#11
yeah looking awesome ! if its works

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#12
[cita="GYATT" pid='928360' dateline='1731790795']
Saludos y saludos, comunidad de Breachforums.

Hoy traigo a la mesa una 'vulnerabilidad crítica de inyección de comandos en dispositivos NAS de D-Link'

Descripción:

CVE-2024-10914 es una vulnerabilidad crítica de inyección de comandos que afecta a los dispositivos de almacenamiento conectado a red (NAS) de D-Link. Esta falla, con una puntuación CVSS de 9,2, permite a atacantes no autenticados ejecutar comandos de shell arbitrarios aprovechando una validación de entrada incorrecta en el comando cgi_user_add. La vulnerabilidad se puede activar de forma remota mediante una solicitud HTTP GET especialmente diseñada, lo que la hace muy explotable.


Enlace al verificador en Github, responda a continuación para obtener acceso si es un miembro no actualizado.

[/cita]
yokis

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: This is an English only forum.
Reply
#13
I am very curious on what exactly this would be. thank you! Big Grin Big Grin
Reply
#14
Thanks pity we wont be getting more.
Reply
#15
pretty new lets see how it works
Reply
#16
(Nov 16, 2024, 08:59 PM)GYATT Wrote: Greetings & Salutations, Breachforums community.

Today I am bringing to the table a 'Critical Command Injection Vulnerability in D-Link NAS Devices'

Description:

CVE-2024-10914 is a critical command injection vulnerability affecting legacy D-Link Network Attached Storage (NAS) devices. This flaw, with a CVSS score of 9.2, allows unauthenticated attackers to execute arbitrary shell commands by exploiting improper input validation in the cgi_user_add command.  The vulnerability can be triggered remotely using a specially crafted HTTP GET request, making it highly exploitable.


Link to checker on Github, reply below to get access if you are an un-upgraded member.

Thank you brother
Reply
#17
Nice thanks i hope we will see you more
Reply
#18
Thanks for sharing
Reply
#19
Thanks! This sounds interesting,
Reply
#20
Checking it out. Nice exploit thx

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  {SECRET} DATABASE OF EXPLOITS lulagain 437 26,709 2 hours ago
Last Post: XRDTX
  [POC] Google OAuth "MultiLogin" endpoint 0-day Farfallaiero 108 13,782 10 hours ago
Last Post: nobcoderfck
  Ban Any Discord Exploit phineasfisherman 7 470 Yesterday, 10:16 AM
Last Post: sniperx86
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 42 3,784 Yesterday, 08:39 AM
Last Post: d39ug
  New Zer0 Day Wordpress A3g00n 81 3,415 May 05, 2026, 03:06 AM
Last Post: DirtyEra

Forum Jump:


 Users browsing this forum: 1 Guest(s)