PoC-in-GitHub/2024/CVE-2024-10914.json

331 lines
12 KiB
JSON
Raw Permalink Normal View History

2025-01-08 01:32:44 +01:00
[
{
"id": 885936481,
"name": "CVE-2024-10914",
"full_name": "imnotcha0s\/CVE-2024-10914",
"owner": {
"login": "imnotcha0s",
"id": 64480742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64480742?v=4",
"html_url": "https:\/\/github.com\/imnotcha0s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imnotcha0s\/CVE-2024-10914",
"description": "Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection",
"fork": false,
"created_at": "2024-11-09T19:30:39Z",
"updated_at": "2024-11-27T14:57:29Z",
"pushed_at": "2024-11-09T19:31:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 886174538,
"name": "CVE-2024-10914",
"full_name": "verylazytech\/CVE-2024-10914",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-10914",
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-12-30T21:06:51Z",
"pushed_at": "2024-11-27T08:26:29Z",
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10914",
"d-link-nas",
"lfi",
"lfi-exploitation",
"poc",
"rce-exploit",
"unauthenticated-rce"
],
"visibility": "public",
"forks": 12,
"watchers": 42,
"score": 0,
"subscribers_count": 1
},
{
"id": 887759528,
"name": "CVE-2024-10914",
"full_name": "Egi08\/CVE-2024-10914",
"owner": {
"login": "Egi08",
"id": 60685799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60685799?v=4",
"html_url": "https:\/\/github.com\/Egi08",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Egi08\/CVE-2024-10914",
"description": "CVE-2024-10914_Manual testing with burpsuite ",
"fork": false,
"created_at": "2024-11-13T08:33:16Z",
"updated_at": "2024-11-16T04:27:57Z",
"pushed_at": "2024-11-13T09:39:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 888892906,
"name": "D-Link-NAS-CVE-2024-10914-",
"full_name": "Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"owner": {
"login": "Bu0uCat",
"id": 169526025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169526025?v=4",
"html_url": "https:\/\/github.com\/Bu0uCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"description": "这是一个D-Link rce漏洞 检测程序",
"fork": false,
"created_at": "2024-11-15T07:56:21Z",
"updated_at": "2024-11-15T07:59:44Z",
"pushed_at": "2024-11-15T07:59:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 889560261,
"name": "CVE-2024-10914",
"full_name": "ThemeHackers\/CVE-2024-10914",
"owner": {
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-10914",
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false,
"created_at": "2024-11-16T16:32:05Z",
"updated_at": "2025-01-02T08:18:01Z",
"pushed_at": "2025-01-02T08:17:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 895213023,
"name": "cve-2024-10914-port",
"full_name": "retuci0\/cve-2024-10914-port",
"owner": {
"login": "retuci0",
"id": 165311393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165311393?v=4",
"html_url": "https:\/\/github.com\/retuci0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/retuci0\/cve-2024-10914-port",
"description": "dlink vulnerability thing in python and rust",
"fork": false,
"created_at": "2024-11-27T19:11:55Z",
"updated_at": "2024-11-27T19:12:49Z",
"pushed_at": "2024-11-27T19:12:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 895284938,
"name": "CVE-2024-10914-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-11-27T23:10:20Z",
"updated_at": "2024-11-27T23:33:14Z",
"pushed_at": "2024-11-27T23:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10914",
"ethical-hacking",
"exploit",
"exploitation",
"hacking",
"proof-of-concept"
],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898276056,
"name": "CVE-2024-10914-Exploit",
"full_name": "jahithoque\/CVE-2024-10914-Exploit",
"owner": {
"login": "jahithoque",
"id": 61009126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61009126?v=4",
"html_url": "https:\/\/github.com\/jahithoque",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jahithoque\/CVE-2024-10914-Exploit",
"description": "CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file \/cgi-bin\/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely.",
"fork": false,
"created_at": "2024-12-04T05:27:36Z",
"updated_at": "2024-12-04T05:31:27Z",
"pushed_at": "2024-12-04T05:31:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 899673788,
"name": "D-Link",
"full_name": "redspy-sec\/D-Link",
"owner": {
"login": "redspy-sec",
"id": 142095788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142095788?v=4",
"html_url": "https:\/\/github.com\/redspy-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/redspy-sec\/D-Link",
"description": "CVE-2024-10914 D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-12-06T19:03:34Z",
"updated_at": "2024-12-18T06:21:38Z",
"pushed_at": "2024-12-07T07:32:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024",
"poc",
"rce-exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 907765018,
"name": "CVE-2024-10914",
"full_name": "dragonXZH\/CVE-2024-10914",
"owner": {
"login": "dragonXZH",
"id": 191017577,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191017577?v=4",
"html_url": "https:\/\/github.com\/dragonXZH",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dragonXZH\/CVE-2024-10914",
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-12-24T10:32:48Z",
"updated_at": "2024-12-24T10:42:23Z",
"pushed_at": "2024-12-24T10:42:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]