[ { "id": 138456315, "name": "WinboxPoC", "full_name": "BasuCert\/WinboxPoC", "owner": { "login": "BasuCert", "id": 29852431, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4", "html_url": "https:\/\/github.com\/BasuCert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC", "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "fork": false, "created_at": "2018-06-24T05:34:05Z", "updated_at": "2024-11-27T08:06:40Z", "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 511, "watchers_count": 511, "has_discussions": false, "forks_count": 454, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 454, "watchers": 511, "score": 0, "subscribers_count": 57 }, { "id": 148370201, "name": "WinboxExploit", "full_name": "msterusky\/WinboxExploit", "owner": { "login": "msterusky", "id": 29436829, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4", "html_url": "https:\/\/github.com\/msterusky", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/msterusky\/WinboxExploit", "description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]", "fork": false, "created_at": "2018-09-11T19:36:49Z", "updated_at": "2024-09-06T05:11:56Z", "pushed_at": "2018-09-11T20:12:25Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 152906288, "name": "MikroRoot", "full_name": "syrex1013\/MikroRoot", "owner": { "login": "syrex1013", "id": 31669127, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4", "html_url": "https:\/\/github.com\/syrex1013", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/syrex1013\/MikroRoot", "description": "Automated version of CVE-2018-14847 (MikroTik Exploit)", "fork": false, "created_at": "2018-10-13T19:17:42Z", "updated_at": "2021-12-06T20:08:10Z", "pushed_at": "2018-10-14T08:39:24Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 15, "score": 0, "subscribers_count": 3 }, { "id": 161894724, "name": "CVE-2018-14847", "full_name": "jas502n\/CVE-2018-14847", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847", "description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞", "fork": false, "created_at": "2018-12-15T10:38:26Z", "updated_at": "2024-09-11T11:05:40Z", "pushed_at": "2018-12-16T04:15:01Z", "stargazers_count": 26, "watchers_count": 26, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 26, "score": 0, "subscribers_count": 2 }, { "id": 188679903, "name": "mikrotik-beast", "full_name": "mahmoodsabir\/mikrotik-beast", "owner": { "login": "mahmoodsabir", "id": 47719250, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4", "html_url": "https:\/\/github.com\/mahmoodsabir", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast", "description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ", "fork": false, "created_at": "2019-05-26T12:26:55Z", "updated_at": "2024-09-08T15:06:00Z", "pushed_at": "2019-05-26T13:06:01Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 0 }, { "id": 210848831, "name": "winboxPOC", "full_name": "Tr33-He11\/winboxPOC", "owner": { "login": "Tr33-He11", "id": 18653509, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4", "html_url": "https:\/\/github.com\/Tr33-He11", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tr33-He11\/winboxPOC", "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ", "fork": false, "created_at": "2019-09-25T13:12:56Z", "updated_at": "2023-10-24T21:52:30Z", "pushed_at": "2019-02-18T09:51:10Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 211658714, "name": "Python-MikrotikLoginExploit", "full_name": "sinichi449\/Python-MikrotikLoginExploit", "owner": { "login": "sinichi449", "id": 44680392, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4", "html_url": "https:\/\/github.com\/sinichi449", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit", "description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script", "fork": false, "created_at": "2019-09-29T12:21:16Z", "updated_at": "2024-12-04T03:22:50Z", "pushed_at": "2019-09-30T04:10:23Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "mikrotik", "python", "winbox" ], "visibility": "public", "forks": 2, "watchers": 18, "score": 0, "subscribers_count": 4 }, { "id": 259795725, "name": "CVE-2018-14847", "full_name": "yukar1z0e\/CVE-2018-14847", "owner": { "login": "yukar1z0e", "id": 44317939, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4", "html_url": "https:\/\/github.com\/yukar1z0e", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847", "description": null, "fork": false, "created_at": "2020-04-29T01:40:33Z", "updated_at": "2022-12-20T04:50:57Z", "pushed_at": "2020-05-18T07:47:58Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 360240266, "name": "Mikrotik-router-hack", "full_name": "hacker30468\/Mikrotik-router-hack", "owner": { "login": "hacker30468", "id": 82890072, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4", "html_url": "https:\/\/github.com\/hacker30468", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack", "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.", "fork": false, "created_at": "2021-04-21T16:42:31Z", "updated_at": "2024-12-30T07:53:04Z", "pushed_at": "2021-04-21T16:46:37Z", "stargazers_count": 49, "watchers_count": 49, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 49, "score": 0, "subscribers_count": 3 }, { "id": 559816350, "name": "routeros-CVE-2018-14847-bytheway", "full_name": "babyshen\/routeros-CVE-2018-14847-bytheway", "owner": { "login": "babyshen", "id": 11402197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4", "html_url": "https:\/\/github.com\/babyshen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway", "description": "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:", "fork": false, "created_at": "2022-10-31T06:38:11Z", "updated_at": "2024-11-21T19:54:59Z", "pushed_at": "2022-11-17T01:22:12Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 790447827, "name": "CVE-2018-14847-EXPLOIT", "full_name": "K3ysTr0K3R\/CVE-2018-14847-EXPLOIT", "owner": { "login": "K3ysTr0K3R", "id": 70909693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", "html_url": "https:\/\/github.com\/K3ysTr0K3R", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT", "description": "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read", "fork": false, "created_at": "2024-04-22T22:33:25Z", "updated_at": "2024-12-30T16:19:41Z", "pushed_at": "2024-05-02T23:52:06Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "credential-disclosure", "credentials", "cve-2018-14847", "directory-traversal", "exploit", "exploitation", "file-read", "hacked", "mikrotik", "poc", "proof-of-concept", "router", "routeros", "winbox" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 } ]