PoC-in-GitHub/2018/CVE-2018-14847.json
2025-01-15 09:31:13 +09:00

363 lines
No EOL
13 KiB
JSON

[
{
"id": 138456315,
"name": "WinboxPoC",
"full_name": "BasuCert\/WinboxPoC",
"owner": {
"login": "BasuCert",
"id": 29852431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
"html_url": "https:\/\/github.com\/BasuCert",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2025-01-04T08:46:24Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 510,
"watchers_count": 510,
"has_discussions": false,
"forks_count": 453,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 453,
"watchers": 510,
"score": 0,
"subscribers_count": 57
},
{
"id": 148370201,
"name": "WinboxExploit",
"full_name": "msterusky\/WinboxExploit",
"owner": {
"login": "msterusky",
"id": 29436829,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
"html_url": "https:\/\/github.com\/msterusky",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
"fork": false,
"created_at": "2018-09-11T19:36:49Z",
"updated_at": "2024-09-06T05:11:56Z",
"pushed_at": "2018-09-11T20:12:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 152906288,
"name": "MikroRoot",
"full_name": "syrex1013\/MikroRoot",
"owner": {
"login": "syrex1013",
"id": 31669127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
"html_url": "https:\/\/github.com\/syrex1013",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
"fork": false,
"created_at": "2018-10-13T19:17:42Z",
"updated_at": "2021-12-06T20:08:10Z",
"pushed_at": "2018-10-14T08:39:24Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},
{
"id": 161894724,
"name": "CVE-2018-14847",
"full_name": "jas502n\/CVE-2018-14847",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
"fork": false,
"created_at": "2018-12-15T10:38:26Z",
"updated_at": "2024-09-11T11:05:40Z",
"pushed_at": "2018-12-16T04:15:01Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 26,
"score": 0,
"subscribers_count": 2
},
{
"id": 188679903,
"name": "mikrotik-beast",
"full_name": "mahmoodsabir\/mikrotik-beast",
"owner": {
"login": "mahmoodsabir",
"id": 47719250,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4",
"html_url": "https:\/\/github.com\/mahmoodsabir",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
"fork": false,
"created_at": "2019-05-26T12:26:55Z",
"updated_at": "2024-09-08T15:06:00Z",
"pushed_at": "2019-05-26T13:06:01Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 210848831,
"name": "winboxPOC",
"full_name": "Tr33-He11\/winboxPOC",
"owner": {
"login": "Tr33-He11",
"id": 18653509,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4",
"html_url": "https:\/\/github.com\/Tr33-He11",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Tr33-He11\/winboxPOC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
"fork": false,
"created_at": "2019-09-25T13:12:56Z",
"updated_at": "2023-10-24T21:52:30Z",
"pushed_at": "2019-02-18T09:51:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 211658714,
"name": "Python-MikrotikLoginExploit",
"full_name": "sinichi449\/Python-MikrotikLoginExploit",
"owner": {
"login": "sinichi449",
"id": 44680392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4",
"html_url": "https:\/\/github.com\/sinichi449",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit",
"description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
"fork": false,
"created_at": "2019-09-29T12:21:16Z",
"updated_at": "2024-12-04T03:22:50Z",
"pushed_at": "2019-09-30T04:10:23Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"mikrotik",
"python",
"winbox"
],
"visibility": "public",
"forks": 2,
"watchers": 18,
"score": 0,
"subscribers_count": 4
},
{
"id": 259795725,
"name": "CVE-2018-14847",
"full_name": "yukar1z0e\/CVE-2018-14847",
"owner": {
"login": "yukar1z0e",
"id": 44317939,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
"html_url": "https:\/\/github.com\/yukar1z0e",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847",
"description": null,
"fork": false,
"created_at": "2020-04-29T01:40:33Z",
"updated_at": "2022-12-20T04:50:57Z",
"pushed_at": "2020-05-18T07:47:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 360240266,
"name": "Mikrotik-router-hack",
"full_name": "hacker30468\/Mikrotik-router-hack",
"owner": {
"login": "hacker30468",
"id": 82890072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4",
"html_url": "https:\/\/github.com\/hacker30468",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack",
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false,
"created_at": "2021-04-21T16:42:31Z",
"updated_at": "2025-01-04T20:24:31Z",
"pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 50,
"score": 0,
"subscribers_count": 3
},
{
"id": 559816350,
"name": "routeros-CVE-2018-14847-bytheway",
"full_name": "babyshen\/routeros-CVE-2018-14847-bytheway",
"owner": {
"login": "babyshen",
"id": 11402197,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4",
"html_url": "https:\/\/github.com\/babyshen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway",
"description": "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:",
"fork": false,
"created_at": "2022-10-31T06:38:11Z",
"updated_at": "2024-11-21T19:54:59Z",
"pushed_at": "2022-11-17T01:22:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 790447827,
"name": "CVE-2018-14847-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
"description": "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read",
"fork": false,
"created_at": "2024-04-22T22:33:25Z",
"updated_at": "2024-12-30T16:19:41Z",
"pushed_at": "2024-05-02T23:52:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"credential-disclosure",
"credentials",
"cve-2018-14847",
"directory-traversal",
"exploit",
"exploitation",
"file-read",
"hacked",
"mikrotik",
"poc",
"proof-of-concept",
"router",
"routeros",
"winbox"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]