PoC-in-GitHub/2020/CVE-2020-35391.json
2025-03-04 09:32:17 +09:00

100 lines
No EOL
3.4 KiB
JSON

[
{
"id": 597735999,
"name": "CVE-2020-35391-POC",
"full_name": "dumitory-dev\/CVE-2020-35391-POC",
"owner": {
"login": "dumitory-dev",
"id": 45358107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45358107?v=4",
"html_url": "https:\/\/github.com\/dumitory-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dumitory-dev\/CVE-2020-35391-POC",
"description": "Tenda N300 Authentication Bypass via Malformed HTTP Request Header",
"fork": false,
"created_at": "2023-02-05T13:42:55Z",
"updated_at": "2024-03-14T16:35:52Z",
"pushed_at": "2023-02-05T14:40:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 611809594,
"name": "CVE-2020-35391",
"full_name": "H454NSec\/CVE-2020-35391",
"owner": {
"login": "H454NSec",
"id": 127287794,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127287794?v=4",
"html_url": "https:\/\/github.com\/H454NSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/H454NSec\/CVE-2020-35391",
"description": "Tenda f3 Malformed HTTP Request Header Processing Vulnerability.",
"fork": false,
"created_at": "2023-03-09T15:36:22Z",
"updated_at": "2024-05-22T16:20:34Z",
"pushed_at": "2023-03-10T15:42:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2020-35391",
"f3",
"tenda"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 941664376,
"name": "Tenda-F3-V4",
"full_name": "4d000\/Tenda-F3-V4",
"owner": {
"login": "4d000",
"id": 197665569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/197665569?v=4",
"html_url": "https:\/\/github.com\/4d000",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/4d000\/Tenda-F3-V4",
"description": "A Python tool for exploiting CVE-2020-35391 on Tenda F3 V3 and F3 V4 routers, allowing unauthorized access to config, flash, and syslog files. Automates the process of downloading hidden files from the router.",
"fork": false,
"created_at": "2025-03-02T20:12:14Z",
"updated_at": "2025-03-03T11:51:44Z",
"pushed_at": "2025-03-03T11:51:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]