PoC-in-GitHub/2024/CVE-2024-10914.json
2025-01-15 15:32:14 +09:00

331 lines
No EOL
12 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 885936481,
"name": "CVE-2024-10914",
"full_name": "imnotcha0s\/CVE-2024-10914",
"owner": {
"login": "imnotcha0s",
"id": 64480742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64480742?v=4",
"html_url": "https:\/\/github.com\/imnotcha0s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imnotcha0s\/CVE-2024-10914",
"description": "Exploit for cve-2024-10914: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 Command Injection",
"fork": false,
"created_at": "2024-11-09T19:30:39Z",
"updated_at": "2024-11-27T14:57:29Z",
"pushed_at": "2024-11-09T19:31:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 886174538,
"name": "CVE-2024-10914",
"full_name": "verylazytech\/CVE-2024-10914",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-10914",
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2025-01-13T09:55:07Z",
"pushed_at": "2024-11-27T08:26:29Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10914",
"d-link-nas",
"lfi",
"lfi-exploitation",
"poc",
"rce-exploit",
"unauthenticated-rce"
],
"visibility": "public",
"forks": 12,
"watchers": 43,
"score": 0,
"subscribers_count": 1
},
{
"id": 887759528,
"name": "CVE-2024-10914",
"full_name": "Egi08\/CVE-2024-10914",
"owner": {
"login": "Egi08",
"id": 60685799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60685799?v=4",
"html_url": "https:\/\/github.com\/Egi08",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Egi08\/CVE-2024-10914",
"description": "CVE-2024-10914_Manual testing with burpsuite ",
"fork": false,
"created_at": "2024-11-13T08:33:16Z",
"updated_at": "2024-11-16T04:27:57Z",
"pushed_at": "2024-11-13T09:39:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 888892906,
"name": "D-Link-NAS-CVE-2024-10914-",
"full_name": "Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"owner": {
"login": "Bu0uCat",
"id": 169526025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169526025?v=4",
"html_url": "https:\/\/github.com\/Bu0uCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Bu0uCat\/D-Link-NAS-CVE-2024-10914-",
"description": "这是一个D-Link rce漏洞 检测程序",
"fork": false,
"created_at": "2024-11-15T07:56:21Z",
"updated_at": "2024-11-15T07:59:44Z",
"pushed_at": "2024-11-15T07:59:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 889560261,
"name": "CVE-2024-10914",
"full_name": "ThemeHackers\/CVE-2024-10914",
"owner": {
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-10914",
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false,
"created_at": "2024-11-16T16:32:05Z",
"updated_at": "2025-01-02T08:18:01Z",
"pushed_at": "2025-01-02T08:17:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 895213023,
"name": "cve-2024-10914-port",
"full_name": "retuci0\/cve-2024-10914-port",
"owner": {
"login": "retuci0",
"id": 165311393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165311393?v=4",
"html_url": "https:\/\/github.com\/retuci0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/retuci0\/cve-2024-10914-port",
"description": "dlink vulnerability thing in python and rust",
"fork": false,
"created_at": "2024-11-27T19:11:55Z",
"updated_at": "2024-11-27T19:12:49Z",
"pushed_at": "2024-11-27T19:12:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 895284938,
"name": "CVE-2024-10914-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-10914-EXPLOIT",
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-11-27T23:10:20Z",
"updated_at": "2024-11-27T23:33:14Z",
"pushed_at": "2024-11-27T23:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10914",
"ethical-hacking",
"exploit",
"exploitation",
"hacking",
"proof-of-concept"
],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 898276056,
"name": "CVE-2024-10914-Exploit",
"full_name": "jahithoque\/CVE-2024-10914-Exploit",
"owner": {
"login": "jahithoque",
"id": 61009126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61009126?v=4",
"html_url": "https:\/\/github.com\/jahithoque",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jahithoque\/CVE-2024-10914-Exploit",
"description": "CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file \/cgi-bin\/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely.",
"fork": false,
"created_at": "2024-12-04T05:27:36Z",
"updated_at": "2024-12-04T05:31:27Z",
"pushed_at": "2024-12-04T05:31:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 899673788,
"name": "D-Link",
"full_name": "redspy-sec\/D-Link",
"owner": {
"login": "redspy-sec",
"id": 142095788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142095788?v=4",
"html_url": "https:\/\/github.com\/redspy-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/redspy-sec\/D-Link",
"description": "CVE-2024-10914 D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-12-06T19:03:34Z",
"updated_at": "2025-01-12T18:34:06Z",
"pushed_at": "2024-12-07T07:32:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024",
"poc",
"rce-exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 907765018,
"name": "CVE-2024-10914",
"full_name": "dragonXZH\/CVE-2024-10914",
"owner": {
"login": "dragonXZH",
"id": 191017577,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191017577?v=4",
"html_url": "https:\/\/github.com\/dragonXZH",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dragonXZH\/CVE-2024-10914",
"description": "A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-12-24T10:32:48Z",
"updated_at": "2024-12-24T10:42:23Z",
"pushed_at": "2024-12-24T10:42:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]