VulInfo
VulInfo copied to clipboard
These are the vulnerabilities discovered by Galaxy Lab.
Did you find a method to get the TP-Link/WR886N device's Root Shell?
您好,我正在复现华硕路由器的栈溢出漏洞,想请问您exp(https://github.com/PAGalaxyLab/VulInfo/blob/master/ASUS/buffer_overflow/ASUS%20GT-AC5300%20stack%20overflow.MD)中的"Set the value of the variable sh_path0"这一步要如何实现,我尝试使用您的数据包进行复现,结果失败,“ReqRespType=VisSetNVRAM&NVRAMName=sh_path0&NVRAMValue=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX HTTP/1.1”这里的payload需要加上GET/POST请求头吗,如果需要的话请问具体要请求哪个cgi呢?