{"uuid": "af397e30-31b1-417e-a14c-7f7675bbf863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0646", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/862", "content": "#exploit\n1. CVE-2020-8515:\nDrayTek Vigor 2960 1.3.1, 3900 1.4.4, Vigor 300B 1.3.3, 1.4.2, 1.4.4 devices allow RCE as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI\nhttps://blog.netlab.360.com/two-zero-days-are-targeting-draytek-broadband-cpe-devices-en\n\n2. CVE-2020-0646:\nSharePoint Workflows XOML Injection\nhttps://www.mdsec.co.uk/2020/01/code-injection-in-workflows-leading-to-sharepoint-rce-cve-2020-0646/?fbclid=IwAR0b4QZxdQKVYN-ES62rdt9yN5MMzfgpK7DkdkbIq44Flm-ODiuqzeIglUQ\n]-&gt; PoC: https://packetstormsecurity.com/files/156930/sharepoint_workflows_xoml.rb.txt", "creation_timestamp": "2024-10-18T16:27:37.000000Z"}