mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 14:15:32 +01:00
167 lines
No EOL
5.9 KiB
JSON
167 lines
No EOL
5.9 KiB
JSON
[
|
|
{
|
|
"id": 428303672,
|
|
"name": "CVE-2021-4045",
|
|
"full_name": "hacefresko\/CVE-2021-4045",
|
|
"owner": {
|
|
"login": "hacefresko",
|
|
"id": 47251535,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47251535?v=4",
|
|
"html_url": "https:\/\/github.com\/hacefresko",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hacefresko\/CVE-2021-4045",
|
|
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
|
|
"fork": false,
|
|
"created_at": "2021-11-15T14:48:14Z",
|
|
"updated_at": "2025-12-04T04:50:15Z",
|
|
"pushed_at": "2024-10-31T18:50:48Z",
|
|
"stargazers_count": 101,
|
|
"watchers_count": 101,
|
|
"has_discussions": false,
|
|
"forks_count": 15,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2021-4045",
|
|
"iot",
|
|
"poc",
|
|
"security",
|
|
"wifi-camera"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 15,
|
|
"watchers": 101,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 549638519,
|
|
"name": "CVE-2021-4045",
|
|
"full_name": "jeffbezosispogg\/CVE-2021-4045",
|
|
"owner": {
|
|
"login": "jeffbezosispogg",
|
|
"id": 115220819,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115220819?v=4",
|
|
"html_url": "https:\/\/github.com\/jeffbezosispogg",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jeffbezosispogg\/CVE-2021-4045",
|
|
"description": "TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)",
|
|
"fork": false,
|
|
"created_at": "2022-10-11T13:56:15Z",
|
|
"updated_at": "2025-09-14T18:51:54Z",
|
|
"pushed_at": "2022-10-08T04:25:10Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 735840223,
|
|
"name": "CVE-2021-4045",
|
|
"full_name": "0xbinder\/CVE-2021-4045",
|
|
"owner": {
|
|
"login": "0xbinder",
|
|
"id": 62325297,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62325297?v=4",
|
|
"html_url": "https:\/\/github.com\/0xbinder",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xbinder\/CVE-2021-4045",
|
|
"description": "🔐 \"PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (<= v1.1.16 Build 211209)\" 🔓",
|
|
"fork": false,
|
|
"created_at": "2023-12-26T08:20:49Z",
|
|
"updated_at": "2025-08-06T11:03:04Z",
|
|
"pushed_at": "2023-12-27T13:33:01Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2021-4045",
|
|
"hackingtools",
|
|
"iot"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 957667635,
|
|
"name": "tapodate",
|
|
"full_name": "DorskFR\/tapodate",
|
|
"owner": {
|
|
"login": "DorskFR",
|
|
"id": 42279120,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42279120?v=4",
|
|
"html_url": "https:\/\/github.com\/DorskFR",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/DorskFR\/tapodate",
|
|
"description": "Sets up a local Tapo C200 using CVE-2021-4045",
|
|
"fork": false,
|
|
"created_at": "2025-03-30T22:46:00Z",
|
|
"updated_at": "2025-09-14T18:51:27Z",
|
|
"pushed_at": "2025-03-31T00:11:42Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1114433833,
|
|
"name": "CVE-2021-4045",
|
|
"full_name": "234329a423853\/CVE-2021-4045",
|
|
"owner": {
|
|
"login": "234329a423853",
|
|
"id": 249087815,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249087815?v=4",
|
|
"html_url": "https:\/\/github.com\/234329a423853",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/234329a423853\/CVE-2021-4045",
|
|
"description": "CVE-2021-4045 CVE-2021-4045 is a Command Injection vulnerability that allows Remote Code Execution in the TP-Link Tapo c200 IP camera. It affects all firmware versions prior to 1.1.16 Build 211209 Rel. 37726N due to insufficient checks on user input in uhttpd, which is one of the main binaries of the device.",
|
|
"fork": false,
|
|
"created_at": "2025-12-11T11:14:47Z",
|
|
"updated_at": "2025-12-11T11:15:51Z",
|
|
"pushed_at": "2025-12-11T11:15:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |