2019-12-08 22:19:20 +09:00
[
{
"id" : 138456315 ,
"name" : "WinboxPoC" ,
"full_name" : "BasuCert\/WinboxPoC" ,
"owner" : {
"login" : "BasuCert" ,
"id" : 29852431 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/BasuCert"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/BasuCert\/WinboxPoC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)" ,
"fork" : false ,
"created_at" : "2018-06-24T05:34:05Z" ,
2024-08-02 21:29:18 +09:00
"updated_at" : "2024-08-02T07:39:44Z" ,
2020-10-17 00:10:27 +09:00
"pushed_at" : "2020-10-16T12:09:45Z" ,
2024-08-02 21:29:18 +09:00
"stargazers_count" : 505 ,
"watchers_count" : 505 ,
2022-11-08 15:19:29 +09:00
"has_discussions" : false ,
2024-07-18 15:29:42 +09:00
"forks_count" : 457 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2024-07-18 15:29:42 +09:00
"forks" : 457 ,
2024-08-02 21:29:18 +09:00
"watchers" : 505 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
2023-07-09 03:29:30 +09:00
"subscribers_count" : 58
2021-04-03 18:12:08 +09:00
} ,
2021-08-22 18:11:46 +09:00
{
"id" : 148370201 ,
"name" : "WinboxExploit" ,
"full_name" : "msterusky\/WinboxExploit" ,
"owner" : {
"login" : "msterusky" ,
"id" : 29436829 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4" ,
"html_url" : "https:\/\/github.com\/msterusky"
} ,
"html_url" : "https:\/\/github.com\/msterusky\/WinboxExploit" ,
"description" : "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]" ,
"fork" : false ,
"created_at" : "2018-09-11T19:36:49Z" ,
2023-04-11 03:32:48 +09:00
"updated_at" : "2023-04-10T14:27:16Z" ,
2021-08-22 18:11:46 +09:00
"pushed_at" : "2018-09-11T20:12:25Z" ,
2023-04-11 03:32:48 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2022-11-08 15:19:29 +09:00
"has_discussions" : false ,
2021-08-22 18:11:46 +09:00
"forks_count" : 3 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-08-22 18:11:46 +09:00
"forks" : 3 ,
2023-04-11 03:32:48 +09:00
"watchers" : 6 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2021-08-22 18:11:46 +09:00
} ,
2024-06-23 09:28:43 +09:00
{
"id" : 152906288 ,
"name" : "MikroRoot" ,
"full_name" : "syrex1013\/MikroRoot" ,
"owner" : {
"login" : "syrex1013" ,
"id" : 31669127 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4" ,
"html_url" : "https:\/\/github.com\/syrex1013"
} ,
"html_url" : "https:\/\/github.com\/syrex1013\/MikroRoot" ,
"description" : "Automated version of CVE-2018-14847 (MikroTik Exploit)" ,
"fork" : false ,
"created_at" : "2018-10-13T19:17:42Z" ,
"updated_at" : "2021-12-06T20:08:10Z" ,
"pushed_at" : "2018-10-14T08:39:24Z" ,
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 15 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
2021-06-16 12:11:19 +09:00
{
"id" : 161894724 ,
"name" : "CVE-2018-14847" ,
"full_name" : "jas502n\/CVE-2018-14847" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2018-14847" ,
"description" : "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞" ,
"fork" : false ,
"created_at" : "2018-12-15T10:38:26Z" ,
2024-07-28 03:29:16 +09:00
"updated_at" : "2024-07-27T12:14:18Z" ,
2021-06-16 12:11:19 +09:00
"pushed_at" : "2018-12-16T04:15:01Z" ,
2024-07-28 03:29:16 +09:00
"stargazers_count" : 25 ,
"watchers_count" : 25 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2023-07-25 09:27:49 +09:00
"forks_count" : 11 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2023-07-25 09:27:49 +09:00
"forks" : 11 ,
2024-07-28 03:29:16 +09:00
"watchers" : 25 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 188679903 ,
"name" : "mikrotik-beast" ,
"full_name" : "mahmoodsabir\/mikrotik-beast" ,
"owner" : {
"login" : "mahmoodsabir" ,
"id" : 47719250 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4" ,
"html_url" : "https:\/\/github.com\/mahmoodsabir"
} ,
"html_url" : "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast" ,
"description" : " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 " ,
"fork" : false ,
"created_at" : "2019-05-26T12:26:55Z" ,
2024-05-03 09:27:39 +09:00
"updated_at" : "2024-05-02T22:32:23Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2019-05-26T13:06:01Z" ,
2024-05-03 09:27:39 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2024-05-03 09:27:39 +09:00
"watchers" : 5 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 0
2023-01-07 09:35:14 +09:00
} ,
2023-08-29 23:04:40 +09:00
{
"id" : 210848831 ,
"name" : "winboxPOC" ,
"full_name" : "Tr33-He11\/winboxPOC" ,
"owner" : {
"login" : "Tr33-He11" ,
"id" : 18653509 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4" ,
"html_url" : "https:\/\/github.com\/Tr33-He11"
} ,
"html_url" : "https:\/\/github.com\/Tr33-He11\/winboxPOC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) " ,
"fork" : false ,
"created_at" : "2019-09-25T13:12:56Z" ,
2023-10-25 09:24:53 +09:00
"updated_at" : "2023-10-24T21:52:30Z" ,
2023-08-29 23:04:40 +09:00
"pushed_at" : "2019-02-18T09:51:10Z" ,
2023-10-25 09:24:53 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-08-29 23:04:40 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-10-25 09:24:53 +09:00
"watchers" : 1 ,
2023-08-29 23:04:40 +09:00
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-01-07 09:35:14 +09:00
{
"id" : 211658714 ,
"name" : "Python-MikrotikLoginExploit" ,
"full_name" : "sinichi449\/Python-MikrotikLoginExploit" ,
"owner" : {
"login" : "sinichi449" ,
"id" : 44680392 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4" ,
"html_url" : "https:\/\/github.com\/sinichi449"
} ,
"html_url" : "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit" ,
"description" : "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script" ,
"fork" : false ,
"created_at" : "2019-09-29T12:21:16Z" ,
2024-03-18 03:26:24 +09:00
"updated_at" : "2024-03-17T13:35:25Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2019-09-30T04:10:23Z" ,
2024-03-18 03:26:24 +09:00
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"exploit" ,
"mikrotik" ,
"python" ,
"winbox"
] ,
"visibility" : "public" ,
"forks" : 2 ,
2024-03-18 03:26:24 +09:00
"watchers" : 17 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 4
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 259795725 ,
"name" : "CVE-2018-14847" ,
"full_name" : "yukar1z0e\/CVE-2018-14847" ,
"owner" : {
"login" : "yukar1z0e" ,
"id" : 44317939 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4" ,
"html_url" : "https:\/\/github.com\/yukar1z0e"
} ,
"html_url" : "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-04-29T01:40:33Z" ,
"updated_at" : "2022-12-20T04:50:57Z" ,
"pushed_at" : "2020-05-18T07:47:58Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 1 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 360240266 ,
"name" : "Mikrotik-router-hack" ,
"full_name" : "hacker30468\/Mikrotik-router-hack" ,
"owner" : {
"login" : "hacker30468" ,
"id" : 82890072 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4" ,
"html_url" : "https:\/\/github.com\/hacker30468"
} ,
"html_url" : "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack" ,
"description" : "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead." ,
"fork" : false ,
"created_at" : "2021-04-21T16:42:31Z" ,
2024-08-01 21:29:14 +09:00
"updated_at" : "2024-08-01T11:16:06Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2021-04-21T16:46:37Z" ,
2024-08-01 21:29:14 +09:00
"stargazers_count" : 40 ,
"watchers_count" : 40 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
2024-08-03 09:28:48 +09:00
"forks_count" : 17 ,
2023-01-07 09:35:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-08-03 09:28:48 +09:00
"forks" : 17 ,
2024-08-01 21:29:14 +09:00
"watchers" : 40 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
2024-01-30 03:26:09 +09:00
"subscribers_count" : 3
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 559816350 ,
"name" : "routeros-CVE-2018-14847-bytheway" ,
"full_name" : "babyshen\/routeros-CVE-2018-14847-bytheway" ,
"owner" : {
"login" : "babyshen" ,
"id" : 11402197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4" ,
"html_url" : "https:\/\/github.com\/babyshen"
} ,
"html_url" : "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway" ,
"description" : "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:" ,
"fork" : false ,
"created_at" : "2022-10-31T06:38:11Z" ,
2023-12-27 21:38:27 +09:00
"updated_at" : "2023-12-27T06:15:39Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2022-11-17T01:22:12Z" ,
2023-10-27 03:25:13 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
2023-10-27 03:25:13 +09:00
"forks_count" : 1 ,
2023-01-07 09:35:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-10-27 03:25:13 +09:00
"forks" : 1 ,
"watchers" : 3 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2024-04-23 09:33:33 +09:00
} ,
{
"id" : 790447827 ,
"name" : "CVE-2018-14847-EXPLOIT" ,
"full_name" : "K3ysTr0K3R\/CVE-2018-14847-EXPLOIT" ,
"owner" : {
"login" : "K3ysTr0K3R" ,
"id" : 70909693 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4" ,
"html_url" : "https:\/\/github.com\/K3ysTr0K3R"
} ,
"html_url" : "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT" ,
2024-04-30 03:38:44 +09:00
"description" : "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read" ,
2024-04-23 09:33:33 +09:00
"fork" : false ,
"created_at" : "2024-04-22T22:33:25Z" ,
2024-05-03 09:27:39 +09:00
"updated_at" : "2024-05-02T23:52:09Z" ,
"pushed_at" : "2024-05-02T23:52:06Z" ,
2024-04-23 09:33:33 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
2024-04-30 03:38:44 +09:00
"topics" : [
"credential-disclosure" ,
"credentials" ,
"cve-2018-14847" ,
"directory-traversal" ,
"exploit" ,
"exploitation" ,
"file-read" ,
"hacked" ,
"mikrotik" ,
"poc" ,
"proof-of-concept" ,
"router" ,
"routeros" ,
"winbox"
] ,
2024-04-23 09:33:33 +09:00
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-04-24 03:29:00 +09:00
"subscribers_count" : 1
2019-12-08 22:19:20 +09:00
}
]