mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
161 lines
No EOL
5.4 KiB
JSON
161 lines
No EOL
5.4 KiB
JSON
[
|
|
{
|
|
"id": 132445475,
|
|
"name": "GPON",
|
|
"full_name": "f3d0x0\/GPON",
|
|
"owner": {
|
|
"login": "f3d0x0",
|
|
"id": 6794063,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6794063?v=4",
|
|
"html_url": "https:\/\/github.com\/f3d0x0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/f3d0x0\/GPON",
|
|
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
|
|
"fork": false,
|
|
"created_at": "2018-05-07T10:34:10Z",
|
|
"updated_at": "2024-02-10T03:45:10Z",
|
|
"pushed_at": "2018-05-10T15:08:43Z",
|
|
"stargazers_count": 209,
|
|
"watchers_count": 209,
|
|
"has_discussions": false,
|
|
"forks_count": 73,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 73,
|
|
"watchers": 209,
|
|
"score": 0,
|
|
"subscribers_count": 11
|
|
},
|
|
{
|
|
"id": 133550928,
|
|
"name": "Pingpon-Exploit",
|
|
"full_name": "649\/Pingpon-Exploit",
|
|
"owner": {
|
|
"login": "649",
|
|
"id": 23534047,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4",
|
|
"html_url": "https:\/\/github.com\/649"
|
|
},
|
|
"html_url": "https:\/\/github.com\/649\/Pingpon-Exploit",
|
|
"description": "Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.",
|
|
"fork": false,
|
|
"created_at": "2018-05-15T17:31:21Z",
|
|
"updated_at": "2023-12-01T09:03:29Z",
|
|
"pushed_at": "2018-05-26T06:44:44Z",
|
|
"stargazers_count": 22,
|
|
"watchers_count": 22,
|
|
"has_discussions": false,
|
|
"forks_count": 14,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 14,
|
|
"watchers": 22,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 133872939,
|
|
"name": "GPON-LOADER",
|
|
"full_name": "Choudai\/GPON-LOADER",
|
|
"owner": {
|
|
"login": "Choudai",
|
|
"id": 28324694,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28324694?v=4",
|
|
"html_url": "https:\/\/github.com\/Choudai"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Choudai\/GPON-LOADER",
|
|
"description": "Exploit loader for Remote Code Execution w\/ Payload on GPON Home Gateway devices (CVE-2018-10562) written in Python.",
|
|
"fork": false,
|
|
"created_at": "2018-05-17T22:03:47Z",
|
|
"updated_at": "2023-11-29T06:49:48Z",
|
|
"pushed_at": "2018-05-17T22:15:13Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"bypass",
|
|
"cve",
|
|
"poc",
|
|
"python",
|
|
"rce",
|
|
"vulnerability"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 134941877,
|
|
"name": "GPON_RCE",
|
|
"full_name": "c0ld1\/GPON_RCE",
|
|
"owner": {
|
|
"login": "c0ld1",
|
|
"id": 39249476,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39249476?v=4",
|
|
"html_url": "https:\/\/github.com\/c0ld1"
|
|
},
|
|
"html_url": "https:\/\/github.com\/c0ld1\/GPON_RCE",
|
|
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python.",
|
|
"fork": false,
|
|
"created_at": "2018-05-26T08:05:22Z",
|
|
"updated_at": "2019-07-30T02:41:47Z",
|
|
"pushed_at": "2018-05-26T08:07:37Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 136307543,
|
|
"name": "CVE-2018-10562",
|
|
"full_name": "ATpiu\/CVE-2018-10562",
|
|
"owner": {
|
|
"login": "ATpiu",
|
|
"id": 26686336,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26686336?v=4",
|
|
"html_url": "https:\/\/github.com\/ATpiu"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ATpiu\/CVE-2018-10562",
|
|
"description": "Exploit for CVE-2018-10562",
|
|
"fork": false,
|
|
"created_at": "2018-06-06T09:43:40Z",
|
|
"updated_at": "2022-04-12T11:37:54Z",
|
|
"pushed_at": "2018-06-07T02:55:20Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"rce-on-gpon-home-routers"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
}
|
|
] |