PoC Week 2025-02-03
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-57595
- Severity: Awaiting analysis
- Impacted Products: DLINK DIR-825 REVB 2.03 devices
- Description: OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter “wps_pin” passed to the apc_client_pin.cgi binary through a POST request.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-57595
- PoC: https://github.com/IdaJea/IOT_vuln_1/blob/master/DIR825/wps_pin.md
CVE-2024-55591
- Severity: 9.8 CRITICAL
- Impacted Products: FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
- Description: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-55591
- PoC: https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591/ (Not a PoC, just a script to check if your instance is vulnerable, but I think it’s valuable and useful as the vuln is critical)
CVE-2024-55194
- Severity: 9.8 CRITICAL
- Impacted Products: OpenImageIO v3.1.0.0dev
- Description: Heap overflow via the component /OpenImageIO/fmath.h.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-55194
- PoC: https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.