Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/codexlynx/cve-2019-25024
Full exploit code for CVE-2019-25024 an unauthenticated command injection flaw in OpenRepeater.
https://github.com/codexlynx/cve-2019-25024
cve cve-2019-25024 exploit mitre openrepeater vulnerability
Last synced: 5 days ago
JSON representation
Full exploit code for CVE-2019-25024 an unauthenticated command injection flaw in OpenRepeater.
- Host: GitHub
- URL: https://github.com/codexlynx/cve-2019-25024
- Owner: codexlynx
- Created: 2021-02-19T15:05:37.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2021-02-21T21:28:47.000Z (over 3 years ago)
- Last Synced: 2023-03-02T19:21:28.449Z (over 1 year ago)
- Topics: cve, cve-2019-25024, exploit, mitre, openrepeater, vulnerability
- Language: Python
- Homepage:
- Size: 1000 Bytes
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## [CVE-2019-25024] OpenRepeater (ORP) / Unauthenticated Command Injection
### Advisories:
* MITRE CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25024
* US NIST: https://nvd.nist.gov/vuln/detail/CVE-2019-25024
* Tenable: https://www.tenable.com/cve/CVE-2019-25024
* VulDB: https://vuldb.com/?id.170172
* Ubuntu: https://ubuntu.com/security/CVE-2019-25024
* Debian: https://security-tracker.debian.org/tracker/CVE-2019-25024
* Launchpad: https://launchpad.net/bugs/cve/CVE-2019-25024### Usage:
```sh
$ python exploit.py
Usage: exploit.py ://
```