PoC-CVE-2024-10914
by GYATT - Saturday November 16, 2024 at 08:59 PM
#11
yeah looking awesome ! if its works

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#12
[cita="GYATT" pid='928360' dateline='1731790795']
Saludos y saludos, comunidad de Breachforums.

Hoy traigo a la mesa una 'vulnerabilidad crítica de inyección de comandos en dispositivos NAS de D-Link'

Descripción:

CVE-2024-10914 es una vulnerabilidad crítica de inyección de comandos que afecta a los dispositivos de almacenamiento conectado a red (NAS) de D-Link. Esta falla, con una puntuación CVSS de 9,2, permite a atacantes no autenticados ejecutar comandos de shell arbitrarios aprovechando una validación de entrada incorrecta en el comando cgi_user_add. La vulnerabilidad se puede activar de forma remota mediante una solicitud HTTP GET especialmente diseñada, lo que la hace muy explotable.


Enlace al verificador en Github, responda a continuación para obtener acceso si es un miembro no actualizado.

[/cita]
yokis

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: This is an English only forum.
Reply
#13
I am very curious on what exactly this would be. thank you! Big Grin Big Grin
Reply
#14
Thanks pity we wont be getting more.
Reply
#15
pretty new lets see how it works
Reply
#16
(Nov 16, 2024, 08:59 PM)GYATT Wrote: Greetings & Salutations, Breachforums community.

Today I am bringing to the table a 'Critical Command Injection Vulnerability in D-Link NAS Devices'

Description:

CVE-2024-10914 is a critical command injection vulnerability affecting legacy D-Link Network Attached Storage (NAS) devices. This flaw, with a CVSS score of 9.2, allows unauthenticated attackers to execute arbitrary shell commands by exploiting improper input validation in the cgi_user_add command.  The vulnerability can be triggered remotely using a specially crafted HTTP GET request, making it highly exploitable.


Link to checker on Github, reply below to get access if you are an un-upgraded member.

Thank you brother
Reply
#17
Nice thanks i hope we will see you more
Reply
#18
Thanks for sharing
Reply
#19
Thanks! This sounds interesting,
Reply
#20
Checking it out. Nice exploit thx

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  new wordpress website takeover vuln (video + poc ) zinzeur 313 27,652 11 minutes ago
Last Post: Usercomplex
  {SECRET} DATABASE OF EXPLOITS lulagain 429 24,661 10 hours ago
Last Post: Yjuddur
  Google Dorks for finding SQL injection vulnerabilities and other security issues 1yush 66 2,916 10 hours ago
Last Post: Yjuddur
  Acunetix Premium Cracked v24 Full Activated A3g00n 22 1,320 Yesterday, 09:22 AM
Last Post: Usercomplex
  CVE-2024-32002 RCE PoC HA_twck 1 377 Apr 24, 2026, 05:13 AM
Last Post: p2wnz_bontensec

Forum Jump:


 Users browsing this forum: 1 Guest(s)