### [CVE-2017-5135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5135) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability. ### POC #### Reference - https://www.reddit.com/r/netsec/comments/67qt6u/cve_20175135_snmp_authentication_bypass/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/NetW0rK1le3r/awesome-hacking-lists - https://github.com/lnick2023/nicenice - https://github.com/nixawk/labs - https://github.com/oneplus-x/MS17-010 - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/readloud/Awesome-Stars - https://github.com/stringbleed/stringbleed.github.io - https://github.com/stringbleed/tools - https://github.com/taielab/awesome-hacking-lists - https://github.com/xbl2022/awesome-hacking-lists - https://github.com/xbl3/awesome-cve-poc_qazbnm456