what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 33 RSS Feed

Files

MikroTik 6.40.5 Denial Of Service
Posted Dec 12, 2017
Authored by Hosein Askari

MikroTik version 6.40.5 kernel failure denial of service proof of concept exploit.

tags | exploit, denial of service, kernel, proof of concept
advisories | CVE-2017-17538
SHA-256 | 36f04caad4ac752ccca12cdf6117122b6b2396e310fadba93409a4509e2e9900

Related Files

MikroTik RouterOS 6.x Reachable Assertion Failure / Null Pointer Dereference
Posted Jul 7, 2021
Authored by Qian Chen

MikroTik RouterOS version 6.x suffers from having multiple null pointer dereference vulnerabilities and a reachable assertion failure.

tags | advisory, vulnerability
advisories | CVE-2021-36613, CVE-2021-36614
SHA-256 | 61fb6d95549c6db4fbf408527ea47e6a0fd075a931405f09c2ed3b080657a245
MikroTik RouterOS Memory Corruption
Posted May 11, 2021
Authored by Qian Chen

MikroTik's RouterOS suffers from multiple memory corruption vulnerabilities. Various versions are affected.

tags | advisory, vulnerability
advisories | CVE-2020-20220, CVE-2020-20227, CVE-2020-20245, CVE-2020-20246
SHA-256 | db5d7fa65930b9710b80f0c424d888eade1e18945b75c10be7be6d7c0cc4bcf5
Mikrotik RouterOS 6.46.5 Memory Corruption / Assertion Failure
Posted May 10, 2021
Authored by Qian Chen

MikroTik RouterOS version 6.46.5 suffers from an assertion failure and multiple memory corruption vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2020-20214, CVE-2020-20222, CVE-2020-20236, CVE-2020-20237
SHA-256 | a64685676fca951c82952a48568cc23b987ea04f6128ac9fa93f1d10f7bfbe11
MikroTik RouterOS Memory Corruption / Reachable Assertion Failure
Posted Sep 11, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from memory corruption and reachable assertion failure vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 55015f99b97a602f7b921cc66a0bad419e61030ea1560cd3d297e3259fc64e59
MikroTik RouterOS Memory Corruption / NULL Pointer Dereference / Division By Zero
Posted Aug 30, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from NULL pointer dereference, memory corruption and division by zero vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 093cf827a466522125a9a60ebaa8035bdab73e9adbf53421b45d078526ed91b9
Mikrotik RouterOS NULL Pointer Dereference / Reachable Assertion Failure
Posted Aug 14, 2020
Authored by Qian Chen

Mikrotik RouterOS suffers from null pointer dereference and reachable assertion failure vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 2df20ffb503d40f9cb6c783de8944c6f8ddb31e97c0d49da69d0f06ea89a0ad1
MikroTik RouterOS Memory Corruption / NULL Pointer / Stack Exhaustion
Posted Jul 27, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from stack exhaustion, memory corruption, and null pointer vulnerabilities. Various 6.44.x versions are affected.

tags | advisory, vulnerability
SHA-256 | 02ab3540de562be70a067e64bdbfd57ec8076c2736ff3eb6a847230788c021a5
MikroTik RouterOS Null Pointer Dereference / Division-By-Zero
Posted Jul 7, 2020
Authored by Qian Chen

MikroTik RouterOS versions prior to stable 6.47 suffer from multiple null pointer dereference vulnerabilities and one division-by-zero vulnerability.

tags | advisory, vulnerability
SHA-256 | f62eaf7184c39f0e8b90c063e78e3e3b83c3de4f01b45d8555571c1e7818d1df
Mikrotik Router Monitoring System 1.2.3 SQL Injection
Posted May 16, 2020
Authored by jul10l1r4

Mikrotik Router Monitoring System versions 1.2.3 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-13118
SHA-256 | 3f2014e238dc93f2a700e3dbe9ea70346fd499fd10b193c4c13b64bcc33f6e43
MikroTik RouterOS Denial Of Service / Memory Corruption
Posted May 12, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from two vulnerabilities. The cerm process suffers from an uncontrolled resource consumption issue. By sending a crafted packet, an authenticated remote user can cause a high cpu load, which may make the device respond slowly or unable to respond. Versions until stable 6.45.7 are affected. The traceroute process suffers from a memory corruption issue. By sending a crafted packet, an authenticated remote user can crash the traceroute process due to invalid memory access. Versions until stable 6.46.4 are affected.

tags | advisory, remote, denial of service, vulnerability
SHA-256 | 77175816ac4a79fca801187367574009b954279dd3a15515035cbab28819403d
MikroTik RouterOS Memory Corruption / Failed Assertion
Posted Jan 7, 2020
Authored by Qian Chen

MikroTik RouterOS versions prior to 6.44.6 suffer from memory corruption and assertion failure vulnerabilities.

tags | advisory, vulnerability
SHA-256 | b9e283a6208f56a952f99e2174e47221c663e9cd7c8f17571ff9c7c8eeb5c785
MikroTik RouterOS 6.45.6 DNS Cache Poisoning
Posted Oct 31, 2019
Authored by Jacob Baines

MikroTik RouterOS version 6.45.6 DNS cache poisoning exploit.

tags | exploit
advisories | CVE-2019-3978
SHA-256 | a383237105abf2d8cd196092df38ab74a7bb21e90a231ec004bccdee62539d22
Mikrotik RouterOS Resource / Stack Exhaustion
Posted Jul 24, 2019
Authored by Qian Chen

Mikrotik RouterOS versions prior to 6.44.5 and 6.45.1 suffer from stack and resource exhaustion vulnerabilities.

tags | advisory, denial of service, vulnerability
advisories | CVE-2019-13954, CVE-2019-13955
SHA-256 | d3abfc481e4ff650ba817b959c8db1aeed9b4e0a9043efaf38c59c7dd9c780de
MikroTik RouterOS Firewall / NAT Bypass
Posted Feb 21, 2019
Authored by Jacob Baines

MikroTik RouterOS versions prior to 6.43.12 (stable) and 6.42.12 (long-term) firewall and NAT bypass exploit.

tags | exploit
advisories | CVE-2019-3924
SHA-256 | 76d8b41f9f478dd81cf50cfdd51f6592ff6a23a044fbd5ad0d719cc3c7cef3ac
Mikrotik RouterOS Telnet Arbitrary Root File Creation
Posted Dec 14, 2018
Authored by Hacker Fantastic

An exploitable arbitrary file creation weakness has been identified in Mikrotik RouterOS that can be leveraged by a malicious attacker to exploit all known versions of Mikrotik RouterOS. The RouterOS contains a telnet client based on GNU inetutils with modifications to remove shell subsystem. However an attacker can leverage the "set tracefile" option to write an arbitrary file into any "rw" area of the filesystem, escaping the restricted shell to gain access to a "ash" busybox shell on some versions. The file is created with root privileges regardless of the RouterOS defined group.

tags | exploit, arbitrary, shell, root
SHA-256 | a939b73387c51054bd5c4c1fabbeade0aabd8445df951b5f0caf507ff0713454
Mikrotik RouterOS Remote Root
Posted Oct 10, 2018
Authored by Jacob Baines

Mikrotik RouterOS versions 6.x suffer from a remote root code execution vulnerability.

tags | exploit, remote, root, code execution
advisories | CVE-2018-14847
SHA-256 | 3f8c52b062ca67ece824e00c875d47df8ead0831abf8803a9a4a87310336aa60
Mikrotik WinBox 6.42 Credential Disclosure
Posted Aug 17, 2018
Authored by Maxim Yefimenko

Mikrotik WinBox version 6.42 suffers from a credential disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | facd664f6ae9c30c9f9f80e3755e975bbd10839dbf536c509f7c498a947844aa
MikroTik 6.41.4 Denial Of Service
Posted Apr 13, 2018
Authored by Hosein Askari

MikroTik version 6.41.4 ftp daemon denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
advisories | CVE-2018-10070
SHA-256 | 9083c84bfb726097b0717778839eb828a579861215f9333a577516923c0d1284
MikroTik RouterOS SMB Buffer Overflow
Posted Mar 15, 2018
Authored by Core Security Technologies, Juan Caillava, Maximiliano Vidal | Site coresecurity.com

A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it.

tags | exploit, remote, overflow, code execution
advisories | CVE-2018-7445
SHA-256 | f596977ec0c838a1e24c8e7b3ba40756d8c45733524c4820e426799d27f008d3
MikroTik RouterOS Chimay Red Stack Clash Remote Code Execution
Posted Mar 13, 2018
Authored by Lorenzo Santina

MikroTik RouterOS versions prior to 6.38.4 (MIPSBE) Chimay Red stack clash remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 4887cd3697d5055f700b1e47d24181ad41552d949b52b2f0b254372f1a8c00ac
MikroTik RouterOS Chimay Red Stack Clash Remote Code Execution
Posted Mar 13, 2018
Authored by Lorenzo Santina

MikroTik RouterOS versions prior to 6.38.4 (x86) Chimay Red stack clash remote code execution exploit.

tags | exploit, remote, x86, code execution
SHA-256 | 3d0f66446eb344c4829bbe2a36b06b9c2daee5d39d92b2e8dbb1e8547ceba83e
MikroTik RouterBoard 6.39.2 / 6.40.5 DNS Denial Of Service
Posted Dec 12, 2017
Authored by Hosein Askari

MikroTik RouterBoard versions 6.39.2 and 6.40.5 DNS daemon denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
advisories | CVE-2017-17537
SHA-256 | 88579439a2df3b04166fc4daa7d8edd3fdfa180e542fd56d1bc866fa43c3cc2a
Mikrotik RouterOS 6.28 Cookie Buffer Overflow
Posted Jun 16, 2017
Authored by sultan albalawi

Mikrotik RouterOS version 6.28 suffers from a cookie HTTP request header buffer overflow vulnerability.

tags | exploit, web, overflow
SHA-256 | f9094809ee7a54b5ba82c3ce861b12c63658ce45783de7698e9d5d83a472dee0
Mikrotik RouterOS 6.39.2 FTP CWD Buffer Overflow
Posted Jun 16, 2017
Authored by sultan albalawi

Mikrotik RouterOS version 6.39.2 suffers from a FTP CWD command buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | a924ceacde68a55f9ad645ab470c04cb0e869ec8522c44c9e1b6c8e517add61e
Mikrotik RouterOS 6.28 FTP Buffer Overflow
Posted Jun 4, 2017
Authored by sultan albalawi

Mikrotik RouterOS version 6.28 suffers from an FTP related buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 79f5a359c7974ddc06477e70b9a5972e81e458a98d7cb6f7f735c690f781c8ce
Page 1 of 2
Back12Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close