PoC-CVE-2024-10914
by GYATT - Saturday November 16, 2024 at 08:59 PM
#11
yeah looking awesome ! if its works

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#12
[cita="GYATT" pid='928360' dateline='1731790795']
Saludos y saludos, comunidad de Breachforums.

Hoy traigo a la mesa una 'vulnerabilidad crítica de inyección de comandos en dispositivos NAS de D-Link'

Descripción:

CVE-2024-10914 es una vulnerabilidad crítica de inyección de comandos que afecta a los dispositivos de almacenamiento conectado a red (NAS) de D-Link. Esta falla, con una puntuación CVSS de 9,2, permite a atacantes no autenticados ejecutar comandos de shell arbitrarios aprovechando una validación de entrada incorrecta en el comando cgi_user_add. La vulnerabilidad se puede activar de forma remota mediante una solicitud HTTP GET especialmente diseñada, lo que la hace muy explotable.


Enlace al verificador en Github, responda a continuación para obtener acceso si es un miembro no actualizado.

[/cita]
yokis

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: This is an English only forum.
Reply
#13
I am very curious on what exactly this would be. thank you! Big Grin Big Grin
Reply
#14
Thanks pity we wont be getting more.
Reply
#15
pretty new lets see how it works
Reply
#16
(Nov 16, 2024, 08:59 PM)GYATT Wrote: Greetings & Salutations, Breachforums community.

Today I am bringing to the table a 'Critical Command Injection Vulnerability in D-Link NAS Devices'

Description:

CVE-2024-10914 is a critical command injection vulnerability affecting legacy D-Link Network Attached Storage (NAS) devices. This flaw, with a CVSS score of 9.2, allows unauthenticated attackers to execute arbitrary shell commands by exploiting improper input validation in the cgi_user_add command.  The vulnerability can be triggered remotely using a specially crafted HTTP GET request, making it highly exploitable.


Link to checker on Github, reply below to get access if you are an un-upgraded member.

Thank you brother
Reply
#17
Nice thanks i hope we will see you more
Reply
#18
Thanks for sharing
Reply
#19
Thanks! This sounds interesting,
Reply
#20
Checking it out. Nice exploit thx

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  New Zer0 Day Wordpress A3g00n 82 3,689 6 hours ago
Last Post: wker
  {SECRET} DATABASE OF EXPLOITS lulagain 440 27,724 May 07, 2026, 09:44 PM
Last Post: caribou
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 44 4,067 May 07, 2026, 04:45 PM
Last Post: Insulina
  [POC] Google OAuth "MultiLogin" endpoint 0-day Farfallaiero 108 14,134 May 06, 2026, 05:42 PM
Last Post: nobcoderfck
  Ban Any Discord Exploit phineasfisherman 7 547 May 06, 2026, 10:16 AM
Last Post: sniperx86

Forum Jump:


 Users browsing this forum: 1 Guest(s)