<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I was looking for proof of concept code for some IoT botnet stuff, and came across this.]]></title><description><![CDATA[<p>I was looking for proof of concept code for some IoT botnet stuff, and came across this.</p><p><a href="https://www.ameeba.com/blog/cve-2024-21821-arbitrary-os-command-execution-vulnerability-in-multiple-tp-link-products/" rel="nofollow noopener"><span>https://www.</span><span>ameeba.com/blog/cve-2024-21821</span><span>-arbitrary-os-command-execution-vulnerability-in-multiple-tp-link-products/</span></a></p><p>However, after looking at a couple of other pages in which they claim to have a hypothetical proof of concept code, I'm realizing that the "proof of concept" is a generic example, and not in any way related to the CVE in question.</p><p>All I'm gonna say is that if you're looking for a CVe and you see this shit website ameeba in your search results, mentally filter it immediately, and fuck these assholes for posting this slop.</p>]]></description><link>https://board.circlewithadot.net/topic/6faf27e3-d57c-4795-9cc2-5b56979e9f99/i-was-looking-for-proof-of-concept-code-for-some-iot-botnet-stuff-and-came-across-this.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 00:49:02 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/6faf27e3-d57c-4795-9cc2-5b56979e9f99.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 15 Apr 2026 18:43:19 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 20:06:17 GMT]]></title><description><![CDATA[<p><span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> <span><a href="/user/rootwyrm%40weird.autos" rel="nofollow noopener">@<span>rootwyrm</span></a></span> <span><a href="/user/dio9sys%40haunted.computer" rel="nofollow noopener">@<span>Dio9sys</span></a></span> <span><a href="https://infosec.exchange/@vulncheck">@<span>vulncheck</span></a></span> they don't appear to store poc, but they do provide links. I'm not sure if they auto-submit links to archive.org or how often they verify that the links are live. interesting questions...</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/reverseics/statuses/116410520559136700</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/reverseics/statuses/116410520559136700</guid><dc:creator><![CDATA[reverseics@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 20:06:17 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 19:58:38 GMT]]></title><description><![CDATA[<p><span><a href="/user/reverseics%40infosec.exchange">@<span>reverseics</span></a></span> <span><a href="/user/rootwyrm%40weird.autos" rel="nofollow noopener">@<span>rootwyrm</span></a></span> <span><a href="/user/dio9sys%40haunted.computer" rel="nofollow noopener">@<span>Dio9sys</span></a></span> <span><a href="https://infosec.exchange/@vulncheck">@<span>vulncheck</span></a></span> which is part of why I wrote IoT_Hunter to have a function to submit reference urls for an exploit to the internet archive. Because I'm seriously tired of that shit.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410490434802787</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410490434802787</guid><dc:creator><![CDATA[da_667@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 19:58:38 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 19:57:20 GMT]]></title><description><![CDATA[<p><span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> <span><a href="/user/reverseics%40infosec.exchange">@<span>reverseics</span></a></span> <span><a href="/user/dio9sys%40haunted.computer">@<span>Dio9sys</span></a></span> I would straight up guarantee all of the ones sitting at the top of the DDG/Kagi/WTF-even-try results are doing no such thing.</p><p>I can spot them from a mile away because they're *ALL* the exact same obvious slop that is literally pure LLM regurgitation with no human review at all.</p><p>e.g. Ameeba doesn't even DO that shit, they're allegedly a 'private workspace for modern work' 'built on encrypted identity.' With LLMs and vibe-coding, of course.</p>]]></description><link>https://board.circlewithadot.net/post/https://weird.autos/users/rootwyrm/statuses/116410485360324700</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://weird.autos/users/rootwyrm/statuses/116410485360324700</guid><dc:creator><![CDATA[rootwyrm@weird.autos]]></dc:creator><pubDate>Wed, 15 Apr 2026 19:57:20 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 19:51:31 GMT]]></title><description><![CDATA[<p><span><a href="/user/reverseics%40infosec.exchange">@<span>reverseics</span></a></span> <span><a href="/user/rootwyrm%40weird.autos" rel="nofollow noopener">@<span>rootwyrm</span></a></span> <span><a href="/user/dio9sys%40haunted.computer" rel="nofollow noopener">@<span>Dio9sys</span></a></span> <span><a href="https://infosec.exchange/@vulncheck">@<span>vulncheck</span></a></span> do they actually archive public proof of concept code or something like that? because if they do... IoT exploits are fucking <em>notorious</em> for "I got my CVE number, time for me delete this entire github repo." bullshit.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410462461329653</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410462461329653</guid><dc:creator><![CDATA[da_667@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 19:51:31 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 19:34:38 GMT]]></title><description><![CDATA[<p><span><a href="/user/rootwyrm%40weird.autos" rel="nofollow noopener">@<span>rootwyrm</span></a></span> <span><a href="/user/dio9sys%40haunted.computer" rel="nofollow noopener">@<span>Dio9sys</span></a></span> <span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> i checked this specific CVE in <span><a href="https://infosec.exchange/@vulncheck">@<span>vulncheck</span></a></span> and I'm happy to report that they report no PoCs for the vuln. </p><p>They are a paid service but I suspect 'you get what you pay for' is the name of the game. Free search results? full of slop, because it makes you keep searching. </p><p>I only hope they can keep up with all the slop that is incoming, without getting overwhelmed themselves.</p><p>Of course if you happen to find one that works, then they are wrong in the other direction ;-). So far though they have been pretty good for identifying vulns that have actual, functioning poc.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/reverseics/statuses/116410396065724160</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/reverseics/statuses/116410396065724160</guid><dc:creator><![CDATA[reverseics@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 19:34:38 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 19:00:22 GMT]]></title><description><![CDATA[<p><span><a href="/user/dio9sys%40haunted.computer">@<span>Dio9sys</span></a></span> <span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> (DDG and Kagi are both very eagerly eating up and aggressively ranking at the top slop sites of every flavor, while pretending reporting it as 'AI generated' will get them to remove it or downrank it.)</p>]]></description><link>https://board.circlewithadot.net/post/https://weird.autos/users/rootwyrm/statuses/116410261348953203</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://weird.autos/users/rootwyrm/statuses/116410261348953203</guid><dc:creator><![CDATA[rootwyrm@weird.autos]]></dc:creator><pubDate>Wed, 15 Apr 2026 19:00:22 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 18:57:47 GMT]]></title><description><![CDATA[<p><span><a href="/user/dio9sys%40haunted.computer">@<span>Dio9sys</span></a></span> <span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> but it's not like Google, DDG, and every other search engine is eating this shit up and promoting these sites, right?<br />Right?</p>]]></description><link>https://board.circlewithadot.net/post/https://weird.autos/users/rootwyrm/statuses/116410251210691399</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://weird.autos/users/rootwyrm/statuses/116410251210691399</guid><dc:creator><![CDATA[rootwyrm@weird.autos]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:57:47 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 18:57:04 GMT]]></title><description><![CDATA[<p><span><a href="/user/dio9sys%40haunted.computer" rel="nofollow noopener">@<span>Dio9sys</span></a></span> this is probably something to put up on my blog to scream about. if only to shit-talk the massive number of orgs doing this.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410248384862327</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410248384862327</guid><dc:creator><![CDATA[da_667@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:57:04 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 18:56:49 GMT]]></title><description><![CDATA[<p><span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span><br />I hate it so so so bad. That and when dudes post "proof of concept" on github and it's just a markdown file with them guessing at how it might work. Feedly always thinks that those repos are the real mccoy</p>]]></description><link>https://board.circlewithadot.net/post/https://haunted.computer/users/Dio9sys/statuses/116410247350693893</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://haunted.computer/users/Dio9sys/statuses/116410247350693893</guid><dc:creator><![CDATA[dio9sys@haunted.computer]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:56:49 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 18:55:32 GMT]]></title><description><![CDATA[<p><span><a href="/user/dio9sys%40haunted.computer" rel="nofollow noopener">@<span>Dio9sys</span></a></span> aqua security, ameeba, cyfirma, and a few others all just do this shit whereby they either just vomit the exact same description on cve.org, or they'll extrapolate on it with generic and/or sometimes incredibly WRONG advice, or shit a bunch of graphs on to the page that mean NOTHING. hell, one of these "helpful sites" output a "remediation" section that was blurred out. "Pay for remediation advice, nerd."</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410242355453542</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410242355453542</guid><dc:creator><![CDATA[da_667@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:55:32 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 18:51:04 GMT]]></title><description><![CDATA[<p><span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span><br />it's downright infuriating</p>]]></description><link>https://board.circlewithadot.net/post/https://haunted.computer/users/Dio9sys/statuses/116410224786891889</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://haunted.computer/users/Dio9sys/statuses/116410224786891889</guid><dc:creator><![CDATA[dio9sys@haunted.computer]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:51:04 GMT</pubDate></item><item><title><![CDATA[Reply to I was looking for proof of concept code for some IoT botnet stuff, and came across this. on Wed, 15 Apr 2026 18:45:21 GMT]]></title><description><![CDATA[<p>I'm so fucking tired of websites that just take the slop generated from the NVD and regurgitate it like the worthless slop they are. But shit like this? where they just fucking make up a proof of concept? Nah. Get absolutely fucked.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410202266064376</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116410202266064376</guid><dc:creator><![CDATA[da_667@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:45:21 GMT</pubDate></item></channel></rss>