[ { "id": 138456315, "name": "WinboxPoC", "full_name": "BasuCert\/WinboxPoC", "owner": { "login": "BasuCert", "id": 29852431, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4", "html_url": "https:\/\/github.com\/BasuCert" }, "html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC", "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "fork": false, "created_at": "2018-06-24T05:34:05Z", "updated_at": "2022-12-29T19:28:20Z", "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 478, "watchers_count": 478, "has_discussions": false, "forks_count": 468, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 468, "watchers": 478, "score": 0 }, { "id": 148370201, "name": "WinboxExploit", "full_name": "msterusky\/WinboxExploit", "owner": { "login": "msterusky", "id": 29436829, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4", "html_url": "https:\/\/github.com\/msterusky" }, "html_url": "https:\/\/github.com\/msterusky\/WinboxExploit", "description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]", "fork": false, "created_at": "2018-09-11T19:36:49Z", "updated_at": "2021-03-13T16:56:42Z", "pushed_at": "2018-09-11T20:12:25Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 5, "score": 0 }, { "id": 152906288, "name": "MikroRoot", "full_name": "syrex1013\/MikroRoot", "owner": { "login": "syrex1013", "id": 31669127, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4", "html_url": "https:\/\/github.com\/syrex1013" }, "html_url": "https:\/\/github.com\/syrex1013\/MikroRoot", "description": "Automated version of CVE-2018-14847 (MikroTik Exploit)", "fork": false, "created_at": "2018-10-13T19:17:42Z", "updated_at": "2021-12-06T20:08:10Z", "pushed_at": "2018-10-14T08:39:24Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 15, "score": 0 }, { "id": 161894724, "name": "CVE-2018-14847", "full_name": "jas502n\/CVE-2018-14847", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847", "description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞", "fork": false, "created_at": "2018-12-15T10:38:26Z", "updated_at": "2022-06-19T10:27:22Z", "pushed_at": "2018-12-16T04:15:01Z", "stargazers_count": 23, "watchers_count": 23, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 23, "score": 0 }, { "id": 188679903, "name": "mikrotik-beast", "full_name": "mahmoodsabir\/mikrotik-beast", "owner": { "login": "mahmoodsabir", "id": 47719250, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4", "html_url": "https:\/\/github.com\/mahmoodsabir" }, "html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast", "description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ", "fork": false, "created_at": "2019-05-26T12:26:55Z", "updated_at": "2020-08-26T17:33:20Z", "pushed_at": "2019-05-26T13:06:01Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 210848831, "name": "winboxPOC", "full_name": "Tr33-He11\/winboxPOC", "owner": { "login": "Tr33-He11", "id": 18653509, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4", "html_url": "https:\/\/github.com\/Tr33-He11" }, "html_url": "https:\/\/github.com\/Tr33-He11\/winboxPOC", "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ", "fork": false, "created_at": "2019-09-25T13:12:56Z", "updated_at": "2021-12-23T21:35:48Z", "pushed_at": "2019-02-18T09:51:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 211658714, "name": "Python-MikrotikLoginExploit", "full_name": "sinichi449\/Python-MikrotikLoginExploit", "owner": { "login": "sinichi449", "id": 44680392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4", "html_url": "https:\/\/github.com\/sinichi449" }, "html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit", "description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script", "fork": false, "created_at": "2019-09-29T12:21:16Z", "updated_at": "2022-12-20T15:32:11Z", "pushed_at": "2019-09-30T04:10:23Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "mikrotik", "python", "winbox" ], "visibility": "public", "forks": 2, "watchers": 16, "score": 0 }, { "id": 259795725, "name": "CVE-2018-14847", "full_name": "yukar1z0e\/CVE-2018-14847", "owner": { "login": "yukar1z0e", "id": 44317939, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4", "html_url": "https:\/\/github.com\/yukar1z0e" }, "html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847", "description": null, "fork": false, "created_at": "2020-04-29T01:40:33Z", "updated_at": "2022-12-20T04:50:57Z", "pushed_at": "2020-05-18T07:47:58Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0 }, { "id": 360240266, "name": "Mikrotik-router-hack", "full_name": "hacker30468\/Mikrotik-router-hack", "owner": { "login": "hacker30468", "id": 82890072, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4", "html_url": "https:\/\/github.com\/hacker30468" }, "html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack", "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.", "fork": false, "created_at": "2021-04-21T16:42:31Z", "updated_at": "2022-12-12T06:32:57Z", "pushed_at": "2021-04-21T16:46:37Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 10, "score": 0 }, { "id": 544275809, "name": "CVE-2018-14847", "full_name": "flux10n\/CVE-2018-14847", "owner": { "login": "flux10n", "id": 98892565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98892565?v=4", "html_url": "https:\/\/github.com\/flux10n" }, "html_url": "https:\/\/github.com\/flux10n\/CVE-2018-14847", "description": "C̷̫͙̦͒̈́̕͜V̵̺̟̘̮̩̻͕͎̝͌͆̀̒͗͠Ę̴̻͇͉͍̍͒̈̕-̸͚̰̺̓͑̓̓͂͒̈̈́͠͝2̸̨̳̘̞̰̹̻̟̅̽͐͝0̵̡̭̋̈́̅͐̉1̵̡̧͔͙̋̈́̔ͅ8̴̡̛͓͖̟̣̒̆̈́́̾̓̕ͅ-̸̺̣̰̓̊͗͒͘͝1̴̭̻̰̉̔͜͜͝4̷̤̍̈́͂̊͐8̷̬̠̓̄̈́̂̚͠4̶̨̢̧̢̺͈̰̹̑̾́͊̈́͜͠7̵̬̲̩̎͋͌̅̍́̎͋͝ ̵̨̞̥̪̝̤̻́̐̇̎͘̚M̴̩͆͑̒̆ị̷̰̱͕̗̝̍͂k̵̢̯͍̄́̉̅̚͘r̷̛͍̉̈́́͌͑o̸͕̘̳̫̞̠͎̿t̶̛̼͚̦̼̳̪̳͉̔̿̋̄̆̋̈́̚͜i̶͈̮͙͊̌͛̈́̈́̅̕͝k̸̛̳͙̺͍̫̟̤͉̫͐ͅ ̶̰̼̹̫̝̦͑̈́͌̌̎̽͐͘͠P̴̛͖̦͚̬̈́͐̑͑͒̌́͠͠ͅÿ̵͎̬̦̻̝̮̬́̈͗̑̄̑̄͝ṭ̴̘͔͙͍̙̈́̋̚͝ḩ̴̨̾̃́̿̐̎͋͌o̷̢̠͈̰̪̦͔̮̾̃̽̔̈́̍͊́͑ń̵̢̢̨͓̞̥̳̱͖̔͌̅͂͊̄͐̏̉ ̷̢̣͈͍̭͆̏͜Ë̸̛̲̑͂x̸̢̨̪͓͕̥̽̍̓̚͝͠p̶̖̟͇̮̒̈̈͂̅̀̊̅ļ̵̧̙̣̘̦̪̲͓̈́̃ͅo̴͕̐̈́̚ĭ̸̻̖̩̯̬̤͓̖̱͋́͜t̶̩̟͈̟̠̹̆̌̀́̈̈́", "fork": false, "created_at": "2022-10-02T04:21:52Z", "updated_at": "2022-10-02T04:24:01Z", "pushed_at": "2022-10-02T04:22:36Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 559816350, "name": "routeros-CVE-2018-14847-bytheway", "full_name": "babyshen\/routeros-CVE-2018-14847-bytheway", "owner": { "login": "babyshen", "id": 11402197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4", "html_url": "https:\/\/github.com\/babyshen" }, "html_url": "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway", "description": "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:", "fork": false, "created_at": "2022-10-31T06:38:11Z", "updated_at": "2022-11-17T01:23:22Z", "pushed_at": "2022-11-17T01:22:12Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 } ]