mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
1.8 KiB
1.8 KiB
CVE-2021-31630
Description
Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application.
POC
Reference
- https://packetstormsecurity.com/files/162563/OpenPLC-WebServer-3-Remote-Code-Execution.html
- https://www.youtube.com/watch?v=l08DHB08Gow
Github
- https://github.com/0xNayel/WifineticTwo
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/FlojBoj/CVE-2021-31630
- https://github.com/Hunt3r0x/CVE-2021-31630-HTB
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/UserB1ank/CVE-2021-31630
- https://github.com/adibabdala123/cve-2021-31630
- https://github.com/adibna/cve-2021-31630
- https://github.com/behindsecurity/htb-wifinetictwo-exploit
- https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE
- https://github.com/hev0x/CVE-2021-31630-OpenPLC_RCE
- https://github.com/junnythemarksman/CVE-2021-31630
- https://github.com/machevalia/OpenPLC-CVE-2021-31630-RCE
- https://github.com/manuelsantosiglesias/CVE-2021-31630
- https://github.com/mind2hex/CVE-2021-31630
- https://github.com/mind2hex/CVE-2021-31630-OpenPLC-3-Authenticated-RCE
- https://github.com/mind2hex/gitbook_public
- https://github.com/n0-traces/cve_monitor
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/sealldeveloper/CVE-2021-31630-PoC
- https://github.com/thewhiteh4t/cve-2021-31630
- https://github.com/ttps-byte/cve-2021-31630