Skip to content

iveresk/cve-2023-20198

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

cve-2023-20198

Description.

1vere$k POC on the CVE-2023-20198 based on the Blog. Also including a check on hexademical response according to the original Cisco article.

The script works in the two modes:

  • check mode which is just makes a connection for the particular URL and checks a response code. If it is 200OK and in the same time response is less then 32 symbols it is a possibility your device is compromised.
  • exploit mode. For the particular one you should define username, password, compromised configuration.
  • added http/https schemas support as recommended in the Cisco article.
  • for getting help just use -h flag.

Example:

git clone https://github.com/iveresk/cve-2023-20198.git
cd cve-2023-21098
pip install -r requirements.txt
python3 cve-2023-21098.py -m check -s https -t <target>

For the help:
python3 cve-2023-21098.py -h

Contact

You are free to contact me via Keybase for any details.

About

1vere$k POC on the CVE-2023-20198

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages