2024-11-29 03:31:51 +09:00
[
{
"id" : 138456315 ,
"name" : "WinboxPoC" ,
"full_name" : "BasuCert\/WinboxPoC" ,
"owner" : {
"login" : "BasuCert" ,
"id" : 29852431 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4" ,
"html_url" : "https:\/\/github.com\/BasuCert" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/BasuCert\/WinboxPoC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)" ,
"fork" : false ,
"created_at" : "2018-06-24T05:34:05Z" ,
"updated_at" : "2024-11-27T08:06:40Z" ,
"pushed_at" : "2020-10-16T12:09:45Z" ,
"stargazers_count" : 511 ,
"watchers_count" : 511 ,
"has_discussions" : false ,
"forks_count" : 453 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 453 ,
"watchers" : 511 ,
"score" : 0 ,
"subscribers_count" : 57
} ,
{
"id" : 148370201 ,
"name" : "WinboxExploit" ,
"full_name" : "msterusky\/WinboxExploit" ,
"owner" : {
"login" : "msterusky" ,
"id" : 29436829 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4" ,
"html_url" : "https:\/\/github.com\/msterusky" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/msterusky\/WinboxExploit" ,
"description" : "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]" ,
"fork" : false ,
"created_at" : "2018-09-11T19:36:49Z" ,
"updated_at" : "2024-09-06T05:11:56Z" ,
"pushed_at" : "2018-09-11T20:12:25Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 152906288 ,
"name" : "MikroRoot" ,
"full_name" : "syrex1013\/MikroRoot" ,
"owner" : {
"login" : "syrex1013" ,
"id" : 31669127 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4" ,
"html_url" : "https:\/\/github.com\/syrex1013" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/syrex1013\/MikroRoot" ,
"description" : "Automated version of CVE-2018-14847 (MikroTik Exploit)" ,
"fork" : false ,
"created_at" : "2018-10-13T19:17:42Z" ,
"updated_at" : "2021-12-06T20:08:10Z" ,
"pushed_at" : "2018-10-14T08:39:24Z" ,
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 15 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 161894724 ,
"name" : "CVE-2018-14847" ,
"full_name" : "jas502n\/CVE-2018-14847" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2018-14847" ,
"description" : "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞" ,
"fork" : false ,
"created_at" : "2018-12-15T10:38:26Z" ,
"updated_at" : "2024-09-11T11:05:40Z" ,
"pushed_at" : "2018-12-16T04:15:01Z" ,
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
"has_discussions" : false ,
"forks_count" : 11 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 11 ,
"watchers" : 26 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 188679903 ,
"name" : "mikrotik-beast" ,
"full_name" : "mahmoodsabir\/mikrotik-beast" ,
"owner" : {
"login" : "mahmoodsabir" ,
"id" : 47719250 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4" ,
"html_url" : "https:\/\/github.com\/mahmoodsabir" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast" ,
"description" : " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 " ,
"fork" : false ,
"created_at" : "2019-05-26T12:26:55Z" ,
"updated_at" : "2024-09-08T15:06:00Z" ,
"pushed_at" : "2019-05-26T13:06:01Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 210848831 ,
"name" : "winboxPOC" ,
"full_name" : "Tr33-He11\/winboxPOC" ,
"owner" : {
"login" : "Tr33-He11" ,
"id" : 18653509 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4" ,
"html_url" : "https:\/\/github.com\/Tr33-He11" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Tr33-He11\/winboxPOC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) " ,
"fork" : false ,
"created_at" : "2019-09-25T13:12:56Z" ,
"updated_at" : "2023-10-24T21:52:30Z" ,
"pushed_at" : "2019-02-18T09:51:10Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 211658714 ,
"name" : "Python-MikrotikLoginExploit" ,
"full_name" : "sinichi449\/Python-MikrotikLoginExploit" ,
"owner" : {
"login" : "sinichi449" ,
"id" : 44680392 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4" ,
"html_url" : "https:\/\/github.com\/sinichi449" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit" ,
"description" : "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script" ,
"fork" : false ,
"created_at" : "2019-09-29T12:21:16Z" ,
2024-12-04 15:32:12 +09:00
"updated_at" : "2024-12-04T03:22:50Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2019-09-30T04:10:23Z" ,
2024-12-04 15:32:12 +09:00
"stargazers_count" : 18 ,
"watchers_count" : 18 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"exploit" ,
"mikrotik" ,
"python" ,
"winbox"
] ,
"visibility" : "public" ,
"forks" : 2 ,
2024-12-04 15:32:12 +09:00
"watchers" : 18 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 259795725 ,
"name" : "CVE-2018-14847" ,
"full_name" : "yukar1z0e\/CVE-2018-14847" ,
"owner" : {
"login" : "yukar1z0e" ,
"id" : 44317939 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4" ,
"html_url" : "https:\/\/github.com\/yukar1z0e" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-04-29T01:40:33Z" ,
"updated_at" : "2022-12-20T04:50:57Z" ,
"pushed_at" : "2020-05-18T07:47:58Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 360240266 ,
"name" : "Mikrotik-router-hack" ,
"full_name" : "hacker30468\/Mikrotik-router-hack" ,
"owner" : {
"login" : "hacker30468" ,
"id" : 82890072 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4" ,
"html_url" : "https:\/\/github.com\/hacker30468" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack" ,
"description" : "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead." ,
"fork" : false ,
"created_at" : "2021-04-21T16:42:31Z" ,
2024-12-19 09:32:20 +09:00
"updated_at" : "2024-12-18T23:36:29Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2021-04-21T16:46:37Z" ,
2024-12-19 09:32:20 +09:00
"stargazers_count" : 49 ,
"watchers_count" : 49 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
2024-12-19 09:32:20 +09:00
"forks_count" : 22 ,
2024-11-29 03:31:51 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-12-19 09:32:20 +09:00
"forks" : 22 ,
"watchers" : 49 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 559816350 ,
"name" : "routeros-CVE-2018-14847-bytheway" ,
"full_name" : "babyshen\/routeros-CVE-2018-14847-bytheway" ,
"owner" : {
"login" : "babyshen" ,
"id" : 11402197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4" ,
"html_url" : "https:\/\/github.com\/babyshen" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway" ,
"description" : "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:" ,
"fork" : false ,
"created_at" : "2022-10-31T06:38:11Z" ,
"updated_at" : "2024-11-21T19:54:59Z" ,
"pushed_at" : "2022-11-17T01:22:12Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 790447827 ,
"name" : "CVE-2018-14847-EXPLOIT" ,
"full_name" : "K3ysTr0K3R\/CVE-2018-14847-EXPLOIT" ,
"owner" : {
"login" : "K3ysTr0K3R" ,
"id" : 70909693 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4" ,
"html_url" : "https:\/\/github.com\/K3ysTr0K3R" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT" ,
"description" : "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read" ,
"fork" : false ,
"created_at" : "2024-04-22T22:33:25Z" ,
2024-12-03 21:32:44 +09:00
"updated_at" : "2024-12-03T08:06:15Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2024-05-02T23:52:06Z" ,
2024-12-03 21:32:44 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"credential-disclosure" ,
"credentials" ,
"cve-2018-14847" ,
"directory-traversal" ,
"exploit" ,
"exploitation" ,
"file-read" ,
"hacked" ,
"mikrotik" ,
"poc" ,
"proof-of-concept" ,
"router" ,
"routeros" ,
"winbox"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-12-03 21:32:44 +09:00
"watchers" : 1 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 1
}
]