Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I was looking for proof of concept code for some IoT botnet stuff, and came across this.

I was looking for proof of concept code for some IoT botnet stuff, and came across this.

Scheduled Pinned Locked Moved Uncategorized
13 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchange
    wrote last edited by
    #1

    I was looking for proof of concept code for some IoT botnet stuff, and came across this.

    https://www.ameeba.com/blog/cve-2024-21821-arbitrary-os-command-execution-vulnerability-in-multiple-tp-link-products/

    However, after looking at a couple of other pages in which they claim to have a hypothetical proof of concept code, I'm realizing that the "proof of concept" is a generic example, and not in any way related to the CVE in question.

    All I'm gonna say is that if you're looking for a CVe and you see this shit website ameeba in your search results, mentally filter it immediately, and fuck these assholes for posting this slop.

    da_667@infosec.exchangeD 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • da_667@infosec.exchangeD da_667@infosec.exchange

      I was looking for proof of concept code for some IoT botnet stuff, and came across this.

      https://www.ameeba.com/blog/cve-2024-21821-arbitrary-os-command-execution-vulnerability-in-multiple-tp-link-products/

      However, after looking at a couple of other pages in which they claim to have a hypothetical proof of concept code, I'm realizing that the "proof of concept" is a generic example, and not in any way related to the CVE in question.

      All I'm gonna say is that if you're looking for a CVe and you see this shit website ameeba in your search results, mentally filter it immediately, and fuck these assholes for posting this slop.

      da_667@infosec.exchangeD This user is from outside of this forum
      da_667@infosec.exchangeD This user is from outside of this forum
      da_667@infosec.exchange
      wrote last edited by
      #2

      I'm so fucking tired of websites that just take the slop generated from the NVD and regurgitate it like the worthless slop they are. But shit like this? where they just fucking make up a proof of concept? Nah. Get absolutely fucked.

      dio9sys@haunted.computerD 1 Reply Last reply
      0
      • da_667@infosec.exchangeD da_667@infosec.exchange

        I'm so fucking tired of websites that just take the slop generated from the NVD and regurgitate it like the worthless slop they are. But shit like this? where they just fucking make up a proof of concept? Nah. Get absolutely fucked.

        dio9sys@haunted.computerD This user is from outside of this forum
        dio9sys@haunted.computerD This user is from outside of this forum
        dio9sys@haunted.computer
        wrote last edited by
        #3

        @da_667
        it's downright infuriating

        da_667@infosec.exchangeD rootwyrm@weird.autosR 2 Replies Last reply
        0
        • dio9sys@haunted.computerD dio9sys@haunted.computer

          @da_667
          it's downright infuriating

          da_667@infosec.exchangeD This user is from outside of this forum
          da_667@infosec.exchangeD This user is from outside of this forum
          da_667@infosec.exchange
          wrote last edited by
          #4

          @Dio9sys aqua security, ameeba, cyfirma, and a few others all just do this shit whereby they either just vomit the exact same description on cve.org, or they'll extrapolate on it with generic and/or sometimes incredibly WRONG advice, or shit a bunch of graphs on to the page that mean NOTHING. hell, one of these "helpful sites" output a "remediation" section that was blurred out. "Pay for remediation advice, nerd."

          dio9sys@haunted.computerD da_667@infosec.exchangeD 2 Replies Last reply
          0
          • da_667@infosec.exchangeD da_667@infosec.exchange

            @Dio9sys aqua security, ameeba, cyfirma, and a few others all just do this shit whereby they either just vomit the exact same description on cve.org, or they'll extrapolate on it with generic and/or sometimes incredibly WRONG advice, or shit a bunch of graphs on to the page that mean NOTHING. hell, one of these "helpful sites" output a "remediation" section that was blurred out. "Pay for remediation advice, nerd."

            dio9sys@haunted.computerD This user is from outside of this forum
            dio9sys@haunted.computerD This user is from outside of this forum
            dio9sys@haunted.computer
            wrote last edited by
            #5

            @da_667
            I hate it so so so bad. That and when dudes post "proof of concept" on github and it's just a markdown file with them guessing at how it might work. Feedly always thinks that those repos are the real mccoy

            1 Reply Last reply
            0
            • da_667@infosec.exchangeD da_667@infosec.exchange

              @Dio9sys aqua security, ameeba, cyfirma, and a few others all just do this shit whereby they either just vomit the exact same description on cve.org, or they'll extrapolate on it with generic and/or sometimes incredibly WRONG advice, or shit a bunch of graphs on to the page that mean NOTHING. hell, one of these "helpful sites" output a "remediation" section that was blurred out. "Pay for remediation advice, nerd."

              da_667@infosec.exchangeD This user is from outside of this forum
              da_667@infosec.exchangeD This user is from outside of this forum
              da_667@infosec.exchange
              wrote last edited by
              #6

              @Dio9sys this is probably something to put up on my blog to scream about. if only to shit-talk the massive number of orgs doing this.

              1 Reply Last reply
              0
              • dio9sys@haunted.computerD dio9sys@haunted.computer

                @da_667
                it's downright infuriating

                rootwyrm@weird.autosR This user is from outside of this forum
                rootwyrm@weird.autosR This user is from outside of this forum
                rootwyrm@weird.autos
                wrote last edited by
                #7

                @Dio9sys @da_667 but it's not like Google, DDG, and every other search engine is eating this shit up and promoting these sites, right?
                Right?

                rootwyrm@weird.autosR reverseics@infosec.exchangeR 2 Replies Last reply
                0
                • rootwyrm@weird.autosR rootwyrm@weird.autos

                  @Dio9sys @da_667 but it's not like Google, DDG, and every other search engine is eating this shit up and promoting these sites, right?
                  Right?

                  rootwyrm@weird.autosR This user is from outside of this forum
                  rootwyrm@weird.autosR This user is from outside of this forum
                  rootwyrm@weird.autos
                  wrote last edited by
                  #8

                  @Dio9sys @da_667 (DDG and Kagi are both very eagerly eating up and aggressively ranking at the top slop sites of every flavor, while pretending reporting it as 'AI generated' will get them to remove it or downrank it.)

                  1 Reply Last reply
                  0
                  • rootwyrm@weird.autosR rootwyrm@weird.autos

                    @Dio9sys @da_667 but it's not like Google, DDG, and every other search engine is eating this shit up and promoting these sites, right?
                    Right?

                    reverseics@infosec.exchangeR This user is from outside of this forum
                    reverseics@infosec.exchangeR This user is from outside of this forum
                    reverseics@infosec.exchange
                    wrote last edited by
                    #9

                    @rootwyrm @Dio9sys @da_667 i checked this specific CVE in @vulncheck and I'm happy to report that they report no PoCs for the vuln.

                    They are a paid service but I suspect 'you get what you pay for' is the name of the game. Free search results? full of slop, because it makes you keep searching.

                    I only hope they can keep up with all the slop that is incoming, without getting overwhelmed themselves.

                    Of course if you happen to find one that works, then they are wrong in the other direction ;-). So far though they have been pretty good for identifying vulns that have actual, functioning poc.

                    da_667@infosec.exchangeD 1 Reply Last reply
                    0
                    • reverseics@infosec.exchangeR reverseics@infosec.exchange

                      @rootwyrm @Dio9sys @da_667 i checked this specific CVE in @vulncheck and I'm happy to report that they report no PoCs for the vuln.

                      They are a paid service but I suspect 'you get what you pay for' is the name of the game. Free search results? full of slop, because it makes you keep searching.

                      I only hope they can keep up with all the slop that is incoming, without getting overwhelmed themselves.

                      Of course if you happen to find one that works, then they are wrong in the other direction ;-). So far though they have been pretty good for identifying vulns that have actual, functioning poc.

                      da_667@infosec.exchangeD This user is from outside of this forum
                      da_667@infosec.exchangeD This user is from outside of this forum
                      da_667@infosec.exchange
                      wrote last edited by
                      #10

                      @reverseics @rootwyrm @Dio9sys @vulncheck do they actually archive public proof of concept code or something like that? because if they do... IoT exploits are fucking notorious for "I got my CVE number, time for me delete this entire github repo." bullshit.

                      rootwyrm@weird.autosR da_667@infosec.exchangeD reverseics@infosec.exchangeR 3 Replies Last reply
                      0
                      • da_667@infosec.exchangeD da_667@infosec.exchange

                        @reverseics @rootwyrm @Dio9sys @vulncheck do they actually archive public proof of concept code or something like that? because if they do... IoT exploits are fucking notorious for "I got my CVE number, time for me delete this entire github repo." bullshit.

                        rootwyrm@weird.autosR This user is from outside of this forum
                        rootwyrm@weird.autosR This user is from outside of this forum
                        rootwyrm@weird.autos
                        wrote last edited by
                        #11

                        @da_667 @reverseics @Dio9sys I would straight up guarantee all of the ones sitting at the top of the DDG/Kagi/WTF-even-try results are doing no such thing.

                        I can spot them from a mile away because they're *ALL* the exact same obvious slop that is literally pure LLM regurgitation with no human review at all.

                        e.g. Ameeba doesn't even DO that shit, they're allegedly a 'private workspace for modern work' 'built on encrypted identity.' With LLMs and vibe-coding, of course.

                        1 Reply Last reply
                        0
                        • da_667@infosec.exchangeD da_667@infosec.exchange

                          @reverseics @rootwyrm @Dio9sys @vulncheck do they actually archive public proof of concept code or something like that? because if they do... IoT exploits are fucking notorious for "I got my CVE number, time for me delete this entire github repo." bullshit.

                          da_667@infosec.exchangeD This user is from outside of this forum
                          da_667@infosec.exchangeD This user is from outside of this forum
                          da_667@infosec.exchange
                          wrote last edited by
                          #12

                          @reverseics @rootwyrm @Dio9sys @vulncheck which is part of why I wrote IoT_Hunter to have a function to submit reference urls for an exploit to the internet archive. Because I'm seriously tired of that shit.

                          1 Reply Last reply
                          1
                          0
                          • da_667@infosec.exchangeD da_667@infosec.exchange

                            @reverseics @rootwyrm @Dio9sys @vulncheck do they actually archive public proof of concept code or something like that? because if they do... IoT exploits are fucking notorious for "I got my CVE number, time for me delete this entire github repo." bullshit.

                            reverseics@infosec.exchangeR This user is from outside of this forum
                            reverseics@infosec.exchangeR This user is from outside of this forum
                            reverseics@infosec.exchange
                            wrote last edited by
                            #13

                            @da_667 @rootwyrm @Dio9sys @vulncheck they don't appear to store poc, but they do provide links. I'm not sure if they auto-submit links to archive.org or how often they verify that the links are live. interesting questions...

                            1 Reply Last reply
                            1
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups